SEC504: Hacker Tools, Techniques, and Incident Handling

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.
Using Machine Learning to Reduce the Alert Fatigue presented by SANS Principal Instructor Nik Alleyne
As a penetration tester, you may be well-versed in your go-to tips, tricks, and tactics for on-premises systems. But what happens when you're tasked with testing new and complex environments like AWS, Azure, Container Workloads, or Kubernetes?
Every organization professes that risk management is at the heart of its cybersecurity program. Threat modeling is at the heart of this proactive approach: a systematic process that helps organizations identify, understand, and mitigate potential threats. However, with technology's ongoing advancement and the rising complexity of digital systems, constructing exhaustive threat models from the ground up can be daunting.
As the field of smartphone forensics evolves rapidly, the tools available often lag, particularly when it comes to processing data from third-party applications and AI-driven content.
When developing an implant in C/C++ for Windows, there will come a time when you must implement some kind of directory enumeration capability. There are several methods that can help you achieve this and this workshop will talk about a few and implement one of them using Windows APIs.
As the nature of our technology landscape changes more and more frequently, it’s challenging for many security operations teams to keep pace with the current threat surface we have on the internet, as well as the state of vulnerabilities and risks associated with these assets. Many security teams are performing vulnerability and web application scanning in a relatively ad hoc manner, and don’t truly have a continuous view of what exists, what state their assets are in, and what types of security issues could manifest if and when they are attacked. For many security operations teams, it’s time to look at continuous scanning and assessment services that can help to discover assets, report on vulnerabilities and risk posture, and help coordinate and comminute these risks across a diverse group of teams and stakeholders. In this review, SANS looks at BreachLock’s attack surface management and penetration testing as a service offerings.
A 90-minute, interactive, gamified leadership exerciseEnhance your proficiency in operational cybersecurity decision-making through immersive team-based simulations with Cyber42. Practice agile decision-making and information synthesis, key skills required for success in leadership roles. Engage in thought-provoking discussions and gain practical insights to improve your cybersecurity competencies.
In 2024, the SOC Survey continued to explore the detailed aspects of cybersecurity operations centers. The survey collected information on organizations’ capabilities, and what is outsourced. On this webcast, SANS Senior Instructor Chris Crowley examines survey results to understand how SOCs are architectured, favorite and frustrating technologies, staffing, funding, threat intel, and automation. Register for this webcast now, and you will automatically receive the companion white paper upon publication.
Part 3 of 6Don't believe the ‘delete’ button! This workshop equips you with the power of data recovery. We'll delve into allocated and unallocated clusters and file slack, the hidden compartments where deleted data can reside. Through hands-on exercises, you'll learn to identify different scenarios when it comes to deleted data, and recover or carve out files thought to be lost forever.
As the internet celebrates 31 years of public availability, Identity, Zero Trust, Cloud and AI currently have all the attention. Defenders face numerous challenges and headwinds in this complex, ever-expanding interconnected ecosystem of commerce, information exchange and cyber warfare.Endpoint, IDS and SIEM are so yesterday. Is network security monitoring even worth mentioning? In this talk, Corelight will explain how elite cyber defenders are updating architecture and capabilities to ensure visibility at the network layer comprehensively, and why ground truth obtained from the network is essential to cyber defense posture now more than ever.
Some of you may remember Y2K. But did you know that it sparked what is now the Internet Storm Center? Travel along and follow me through time to see how attacks, actors, and victims have changed over a quarter of a century. Did you know that GIAC wasn’t a certification at all back in the day? Have you heard of “Leaves," “Code Red,” and “Nimda?" We will look at data showing how the survival time of a system connected to the internet has changed. How did Windows XP SP2 drastically change the attack landscape, and how did our sensor configurations change over the years in response? But this isn't just "story time." This is about lessons learned and projecting the future: How will you be able to survive the next wave? What would I tell "young Johannes" if I could actually go back in time? Find out the answers to all of these questions and be entertained by, yes, some stories (I will leave it up to you to decide if they are good or bad stories).
Process code injection remains a common threat, exploiting modern memory architecture to execute malicious code within the address space of legitimate processes. Delve into process code injection and gain a comprehensive understanding of various techniques employed by adversaries, such as Windows API-based injection, reflective code injection, process hollowing, and process doppelgänging.