Hacking NGFW and NGIPS For Fun and Profits

Presented at NolaCon 2015, June 12, 2015, 3 p.m. (Unknown duration).

Section - 1 Key Feature Differentiators between UTM, NGFW, Cisco ASA, and SIEM. Research Examples will be reserved for market leaders and comparing offerings associated with each. Section - 2 Popular Detection IDS & FW utilities and their usage in typical network topographies. Section - 3 Methods and Tool-sets for Evading Firewalls and IDS Evasion Countermeasures IDS & FW Abstract Methodology IDS & FW Penetration Testing Section - 4 Tools and Reporting Format utilized to translate and present metrics from auditing data. Creation of your own Virtual Testing Lab Section - 5 Advanced Malware Testing Advanced Evasion Techniques(APT) Testing

Presenters:

  • Jonathan Suldo
    The past 5 years I've taken the hobby and made it a profession as Penetration Tester and Information Security Analyst. I've had the privilege to gain experience working across various domains of Information Security. Currently, I'm a contracting Information Security Analyst for my own Cyber Security company called Arma-Net,llc. I perform Contracting and Consulting associated with a wide variety of Cyber Security projects. In the more recent months I have been providing consulting and managed security services for Information Assurance- Governance, Risk, and Compliance auditing. The auditing work has evolved mainly into hacking/auditing of "cutting edge" Enterprise grade Security appliances. It has became a personal interest and research focus of mine. I'd like to share some of high level tools and methods I use for these testing processes.

Links:

Similar Presentations: