SEC504: Hacker Tools, Techniques, and Incident Handling

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.
The dust has begun to settle on another successful RSA® Conference where SANS continued its 15-year tradition of highlighting some of the year's most concerning emerging threats.This year’s Top New Attacks & Threats Report and virtual event will take a deeper dive into the emerging threats discussed during the annual SANS keynote at RSA® Conference and look at numerous other noteworthy attacker trends. SANS Certified Instructor and event chair, Lee Crognale will provide mitigation strategies and actionable advice on the critical skills, processes, and controls needed to protect enterprises from these advanced attacks.Topics will include:The Security Cost of Technical DebtVerifying Identity in the Age of AILLMs Hyper-Accelerate the Exploitation LifecycleThe Use of AI to Defeat Novel MalwareThe Organizational Risks associated with Generative AIDeveloping Detection Mechanisms for Detecting Deepfakes & Gaining Digital Trust.Register for this virtual event now, and you will automatically receive the companion white paper upon publication.GET THE FULL EXPERIENCE - Join the SANS interactive Slack workspace for this event and you can connect live with SANS authors and speakers, have a chance to win prizes, and network with fellow attendees.
In this workshop we will begin with a presentation of the cryptographic systems that can be leveraged to create digital signatures and why we want to use these signatures (their importance). We will discuss the more common use cases for signatures (such as digitally signed email) and then move into more recent examples such as DKIM (DomainKeys Identified Mail), as well as their use for incident detection and response.
This hands-on workshop equips you with a key skill in digital forensics: mounting and exploring forensic disk images. Uncover the secrets hidden within digital evidence!
The rapid adoption and growth of cloud computing solutions across industry sectors and application families is driven by the many advantages of cloud computing technologies. These include faster deployments, better scalability, improved vendor support and faster security patching, access to newer technology, better resilience, fault tolerance, and recovery options – all at a lower cost.
Those bizarre strings of letters and numbers you encounter during investigations? They might just be Base64 in disguise! This in-depth workshop is your chance to crack the code and unlock the secrets of Base64 through hands-on exercises, to learn how data – from text and images to crucial evidence – is encoded and decoded using this format.
In an age where cybersecurity threats are ever-present and the regulatory environment is constantly shifting, establishing robust and strategic audit practices is crucial for safeguarding organizational integrity.
Being able to perform OT Cyber Security Risk Assessments is becoming more essential with each passing year. Drivers to perform a risk assessment vary, it might be a regulatory requirement, internal justification for investment or simply to better understand your operational risk. Finding skilled resources to be able to perform a risk assessment and running one in your busy operational environment can be extremely challenging. This presentation will explore how to prepare, execute and report out an effective OT Cyber Security Risk Assessment following the IEC 62443-3-2 Methodology; best practices and examples will be provided from completed risk assessments.
As physical and cyber attacks on critical infrastructure and industrial control systems (ICS) have become increasingly brazen, ICS defenses must go beyond just preventative security. ICS defenses must be ICS-specific, teams need to be proactive and have ICS cyber specific knowledge and skills. This is because traditional IT security controls applied to ICS are ineffective, cause disruptions and safety interferences. ICS cyber defense is doable and necessary to protect the critical systems that support our modern way of life. These systems make, move and power our world - power grids, water management systems, critical manufacturing, etc. Join Dean Parsons as he walks through recent critical infrastructure incidents, and the related ICS defense controls to defend our critical engineering environments in times of warfare where cyber attacks and physical attacks are combined. AND 1 FREE ICS GIVEWAY at the talk.
この講演では、攻撃者が攻撃対象のLinuxシステム上で永続性を確立するための様々な方法について説明します。Windowsシステムにおいて永続性を確立する方法として、Run/RunOnceレジストリキーやタスクスケジューラなどを悪用する手法が広く知られていますが、Linux上で攻撃者がどこに隠れているかをご存知ですか?
This talk will discuss the various ways that attackers try to maintain persistence on victim systems.
This presentation explores the transformative role of Artificial Intelligence (AI) in modern SOCs, focusing on its application to improve threat detection, automate incident responses, and enable predictive analytics for a proactive defense strategy.
Human-powered security—aka community-driven bug bounties—can be a game changer for your offensive security strategy. Complementary to red teaming and penetration testing, bug bounties can help organizations enhance their security posture, protect customer data, and ensure business continuity. In this webcast, we’ll examine the unique advantages of these programs, from advanced threat detection to continuous security improvements.