Poor Man’s Spy vs. Spy - Analysis of Red Team Attack Techniques by Blue Team Forensicators

Presented at RVAsec 2017, June 9, 2017, 3 p.m. (60 minutes)

How advanced are the cyber attack techniques that are all over the news these days? Could you detect a determined attacker that gains a foothold in your network with open source host and network based monitoring tools? This talk will walk through an attack modeled after real world attacker techniques and show how you can detect and respond using custom and open source resources.


Presenters:

  • Troy Wojewoda
    Troy Wojewoda has been in the information security industry for over 10 years working in a wide array of roles such as application and system administration, network intrusion detection, wireless security, host and network digital forensics and incident response. Today, he leads the incident response team at his current employer and is also focused on cyber intel processing, IOC hunting, advanced adversary tracking, malware analysis and custom tool development.
  • Derek Banks - Black Hills Information Security
    Derek is a Senior Security Analyst at Black Hills Information Security and has over 20 years of experience in the IT industry as a systems administrator for multiple operating system platforms, and monitoring and defending those systems from potential intruders. He has worked in the aerospace, defense, banking, manufacturing, and software development industries. Derek has experience with creating custom host and network based monitoring solutions.

Links:

Similar Presentations: