Thinking in Reverse to Move Your Network Security Forward: Using PCAP to Break Down Application-Layer Protocols

Presented at THOTCON 0xA (2019), May 3, 2019, 4 p.m. (120 minutes).

As networks become increasingly complex, the ability to break an unknown protocol down and understand its base components and how they interact is a critical element of network security. Protocol reverse engineering allows security analysts to understand not just how the protocol works, but the ways it can leave your enterprise vulnerable. This is especially true at the application level, where insecure or poorly managed applications can leak sensitive data. In this hands-on, interactive workshop, attendees will learn how to reverse engineer real application-layer protocols. During our time together, we'll start at the surface and do a deep technical dive into the network traffic of a common remote access application.


Presenters:

  • David Pearson
    David has spent most of his career understanding how networks & apps work, currently as Head of Threat Research for Awake Security.

Similar Presentations: