Easy Indicators of Compromise: Creating a Deception Infrastructure

Presented at NolaCon 2017, May 19, 2017, 2 p.m. (Unknown duration).

As an attacker there are certain things that I will go after that should never be seen in a network. This presentation will focus on deception techniques that any organization can implement in order to create fake infrastructure that attackers will use in order to identify them in the early stages of an attack. Deception techniques are interesting, because it really needs to be believable for an attacker to go after them. This presentation talks about different techniques that make it hard for an attacker to differentiate with what’s real and what’s not, and how to best build better defenses.


Presenters:

  • David Kennedy / ReL1K as David Kennedy
    David Kennedy is the Founder of TrustedSec, LLC and Co-Founder and CTO of Binary Defense Systems (BDS). David started both these companies with the belief in the betterment of the security industry and promoting the advancement of the industry through quality services. TrustedSec and BDS (both sister companies) provide consulting and MSSP services and can handle every aspect of an organization. Prior to TrustedSec and BDS, David was a Chief Security Officer (CSO) for Diebold Incorporated, an international Fortune 1000 global company. David has had guest appearances on FoxNews, CNN, and other high-profile media outlets. David is the founder of DerbyCon, a large-scale security conference in Louisville Kentucky. David also co-authored Metasploit: The Penetration Testers Guide book which was number one on Amazon.com in security for over 6 months. David was also one of the founding members of the “Penetration Testing Execution Standard (PTES)“. PTES is the industry leading standard and guidelines around how penetration tests should be performed and methodologies.David is the creator of several widely popular open-source tools including “The Social-Engineer Toolkit” (SET) and many more. David has over 12 years of security experience, with over five years specifically for information security consulting. Lastly, David was a U.S. Marine working for the intelligence community and spent several years in the middle east including Iraq. Twitter: @HackingDave

Links:

Similar Presentations: