![]() Then we will analyze network traffic with Wireshark, Virus Total, and Packet Total to find suspicious traffic, reconstruct the attacker's actions, and recover downloaded files. We will use a pre-installed Splunk server with archived attack data to find and analyze attacks including vulnerability scans, brute force attacks, ransomware, Web site defacement. We will cover centralized security monitoring in detail, using Splunk and Suricata to find and analyze attacks. We will use Caldera to simulate all the stages of an attack and test defenses. We will begin with a high-level view of attacks: Groups, Tactics and Techniques in the ATT&CK matrix, and attribution. We will have several instructors available to tutor participants one-on-one as needed. Our goal is to make sure each participant learns useful, new things in their area of interest. This way, novices can gain awareness of the tools, techniques, and results of each activity, and more advanced participants can delve deeply into the details. ![]() Complete instructions guide participants through beginning projects, and a series of challenges of escalating difficulty are presented to encourage each participant to progress to their appropriate level of accomplishment. The instructor will briefly explain the principles and demonstrate the attacks, but workshop participants will spend most of their time performing hands-on projects. All the tools we will use are freely available, and all the training materials will remain available to everyone after the workshop ends.Ĭlass structure: A live CTF scoreboard is running so participants can compete to solve challenges. Participants need a computer that can run virtual machines, or a credit card and a few dollars to rent cloud servers. We will help participants as needed, to ensure that everyone learns new techniques. ![]() There are also harder challenges for more experienced participants. ![]() The techniques will be demonstrated, with complete step-by-step instructions to lead beginners through the easy challenges. Each participant works at their own pace. Intermediate Full-Stack Incident ResponseĪll these workshops are structured in a CTF format. Workshops Beginners Cryptography and Blockchain Security ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |