Learn how to pull reports remotely and gather information about a security incident or suspect behavior with almost no setup and a single mouse click.
You think your WINDOWS endpoint is infected, or suspect inappropriate behavior! Now what? Is it disconnected from the network? Is it safe to turn it back on? Let's find out with open source tools in this workshop. The first half we will dive into the file system. Go over some ways that attackers can infect end points, and learn how we can find indicators of compromise on a suspect system. In the second half, we will use some free and open source tools to complete a mini CTF using what we learned to find out if, how, and when we have been compromised in this Windows focused workshop.
Finding a budget for CyberSecurity can be hard. Leverage your prior CAPEX expenditures to gather AI training data and uncover your adversary with cheap honeypots.
In this lab we cover some honeypot research conducted at UVU which leveraged old hardware, unused ports, and open source software to create a low-stakes honeypot designed to reveal threat actors. Turn the tables while spending little. Gather AI training data about the latest attempts on your network. In this presentation, I will cover our cybersecurity research deployment in the UVU data center, which can be easily replicated in your environment. We discuss ways to fund such a project for next to nothing. We also talk about the tissue paradigm for this type of project that leverages existing equipment and free software, "If the software breaks or the hardware fails, so what?" I share data on attacks and how that can be converted into valuable intelligence for your production network. I also discuss how you can gather information that is useful to AI. Lastly, we talk about getting your entire site blacklisted by hackers so they don't even bother messing with your network. At the end, we will answer audience questions and explore custom use case scenarios, including scenarios that may benefit you if your firewall is managed by others or if you only have internal resources and need effective trip-wires.
This presentation delves into a seemingly innocuous detail about the small European nation of Andorra that can have significant implications for cybersecurity. We will explore an unexpected overlap between Andorra's unique digital identity and common network configurations, revealing a subtle vulnerability that penetration testers can exploit.
Systems and Security Manager at Jordan School District. Running our Security program for 58,000 students, 8,000 staff, and too many devices to enumerate. David has spent the last 8 years in and around technology in the K-12 environment. David's hobby is way too many Saintcon Minibadges... Read More →
Thursday June 12, 2025 1:15pm - 2:15pm MDT Room 1410