«

Jul 21 2015

Honeypots workshop at BSidesLV 2015!

I am very happy to announce that a honeypots workshop will take place during BSides Las Vegas for a 2nd year in a row! BSides is a fantastic community driven InfoSec convention and Las Vegas is the best place to be in August!

The workshop is titled “You Hack, We Capture: Attack Analysis with Honeypots“, lasts half a day (4 hours) and will be presented by me.

It takes place on Wednesday the 5th of August, from 8.30AM to 12.25PM.

Spots are numbered and limited! If you want to reserve a seat, you can do so via this page: https://www.bsideslv.org/registration/workshop-sign-ups/ (second to last)

Here is the workshop’s description:

Honeypots are systems aimed at deceiving malicious users or software that launch attacks against the infrastructure of various organizations. They can be deployed as protection mechanisms for an organization’s real systems, or as research units to analyze the methods employed by human hackers or malware. In this workshop we will study the operation of two research honeypots. A honeypot system will undertake the role of a web trap for attackers who target the SSH service. Another one will undertake the role of a malware collector, usually deployed by malware analysts to gather and store malicious binary samples. We will also talk about post-capturing activities and further analysis techniques. Furthermore, visualization tools and techniques will be presented, plus a honeypot bundle Linux distribution that contains pre-configured versions of the above tools and much more related utilities, which can make the deployment of honeypots an easy task.

Hope to see you all in Vegas!

Powered by WordPress and the Graphene Theme.

More in Blog News, General News, Honeypots, Malware, Visualization
Kippo-Graph 1.5.1 released!
Easy importing of HoneyDrive to VMware Fusion
#Honeynet2014 - Gadi Evron - Cyber Counter Intelligence: An attacker-based approach
Honeypots for Active Defense: A Practical Guide to Deploying Honeynets Within the Enterprise
Cybersecurity and the Age of Privateering: A Historical Analogy
Close