As networks become increasingly complex, the ability to break an unknown protocol down and understand its base components and how they interact is a critical element of network security.
Protocol reverse engineering allows security analysts to understand not just how the protocol works, but the ways it can leave your enterprise vulnerable. This is especially true at the application level, where insecure or poorly managed applications can leak sensitive data.
In this workshop, attendees will learn how to reverse engineer real application-layer protocols via a deep technical dive into the network traffic of a common remote access application. The workshop will culminate with an example of identifying connections between attacker traffic in the real world.