Tutorials - Day 1 (Thursday, Nov 16th)
Description | Prerequisites | Trainer |
---|---|---|
Technical Difficulty: Beginner In this class attendees learn the tools and techniques used to analyze a malware-related incident based on the data captured from many different sources (ids, full packet capture, dhcp and dns server, proxy logs and more). | The VM with toolset and exercises are provided to the attendees prior to the class. | •Marcin Szymankiewicz |
Description | Prerequisites | Trainer |
---|---|---|
Technical Difficulty: Intermediate / Advanced In this workshop, you will learn how to apply machine learning to undertake a range of cyber security activities, including the identification of polymorphic malware families as well as building your own next generation AV. | This workshop will involve python coding and real world malware. Some experience with Python is required to gain the most value from the lesson. | • Felix Leder • Ben Whitham • Brian Hay |
Description | Prerequisites | Trainer |
---|---|---|
Technical Difficulty: Intermediate In this workshop attendees learn the tools and techniques used to analyze and reverse malicious JavaScript redirection code used by many exploit kits including Angler, Fiesta or Nuclear. In the workshop attendees analyze real examples of obfuscated JavaScript in tools like JSBeautifier, JSDetox or JSUNPACK to understand the code flow, conditional criteria for successful exploitation attempt and to get the final infection URL(s). | The VM with toolset and exercises are provided to the attendees prior to the class. | • Marcin Szymankiewicz |
Description | Prerequisites | Trainer |
---|---|---|
Technical Difficulty: Intermediate / Advanced Continuation from the previous session In this workshop, you will learn how to apply machine learning to undertake a range of cyber security activities, including the identification of polymorphic malware families as well as building your own next generation AV. | This workshop will involve python coding and real world malware. Some experience with Python is required to gain the most value from the lesson. | • Felix Leder • Ben Whitham • Brian Hay |
-
Incident Response and Analysis.Incident Response Tools and Techniques Track
(Marcin Szymankiewicz)
Location:TBC09:00 - 12:30 -
Applying Machine Learning to Cyber Security – Part 1Machine Learning for Cyber Security Track
(Brian Hay, Felix Leder)
Location:TBC09:00 - 12:30 -
Introduction to Cyber DeceptionHoneythings Track
(Ben Whitham and Lukas Rist)
Location:TBC09:00 - 12:30 -
Lunch12:30 - 13:30
-
Reverse engineering of malicious JavaScriptIncident Response Tools and Techniques Track
(Marcin Szymankiewicz)
Location:TBC13:30 - 17:00 -
Applying Machine Learning to Cyber Security – Part 2Machine Learning for Cyber Security Track
(Brian Hay, Felix Leder)
Location:TBC13:30 - 17:00 -
Hands on with Cowrie - the World’s Most Popular SSH HoneypotHoneythings Track
(Michel Ooserhof)
Location:TBC13:30 - 17:00
Tutorials - Day 2
Description | Prerequisites | Trainer |
---|---|---|
Technical Difficulty: Intermediate This hands-on workshop will highlight techniques and issues related to analyzing malicious office documents (xls, ppt, doc) and PDF files. This workshop will walk through participant how to analyze in-the-wild malicious office documents. We’ll share how we can analyze malicious document file by using few techniques and method against different office file formats. The malicious macro will be covered as main topic in this workshop. Shellcode analysis will be conducted as well to get the whole picture of malicious documents attack anatomy. | TBC | • Mahmud Ab Rahman |
Description | Prerequisites | Trainer |
---|---|---|
Technical Difficulty: Beginner/Intermediate Android malware is very common, diverse and have been spreading all over the world. This malware ins capable of stealing information, abuse of the mobile devices and extorting the users for money among other nefarious activities. | Virtual Box and 64bits OS | • Hanno Lemoine • Hugo Gonzalez |
Description | Prerequisites | Trainer |
---|---|---|
Technical Difficulty: Beginner Honeypots are only useful if the insider or network intruder interacts with them. This is a challenge as often honeypots can be placed in locations within the production network that are isolated and/or away from the real data. | TBC | • Ben Whitham • Adel Karimi |
Description | Prerequisites | Trainer |
---|---|---|
Morning session - Introduction to Capture the Flag: Capture the Flag (CTF) events are games where participants are awarded points for finding flags (i.e., specific pieces of data) within the environment. This exploration is largely guided by challenges such as gaining access to an account, or finding some hidden information within a service. This gentle guided introduction to CTF focuses on challenges designed to explore various security concepts in both Linux and Windows environments without requiring specialized tools. No prior system knowledge (or software) is expected or required to participate. | None | • Kara Nance • Brian Hay |
Description | Prerequisites | Trainer |
---|---|---|
Technical Difficulty: Intermediate Continuation from the morning session. PDF exploits are still used as attack vector in order to execute code in the victims' computers. They are still included in some Exploit Kits nowadays, but are usually chosen to perform targeted attacks too. This session will show you how to distinguish a malicious PDF file from a harmless one, how to extract and analyze all the relevant elements like Javascript code and shellcodes, and how to automate the analysis using peepdf. Attendees will learn helpful tricks to analyze those documents and they will not get scared by opening a PDF document anymore. | TBC | • TBC |
Description | Prerequisites | Trainer |
---|---|---|
Technical Difficulty: Beginner/Intermediate Android malware is very common, diverse and have been spreading all over the world. This malware ins capable of stealing information, abuse of the mobile devices and extorting the users for money among other nefarious activities. | Virtual Box and 64bits OS | • Hanno Lemoine • Hugo Gonzalez |
Description | Prerequisites | Trainer |
---|---|---|
Technical Difficulty: Intermediate to Advanced In this training session you will learn everything about Glutton, the all eating honeypot. |
| • Lukas Rist |
-
Investigating Malicious Office and PDF Documents Part 1Analyzing Malicious Files Track
(Mahmud Ab Rahman)
Location:TBC09:00 - 12:30 -
Android Reverse Engineering - Part 1Malware Track
(Hugo Gonzalez and Hanno Lemoine)
Location:TBC09:00 - 12:30 -
Making Credentials, Beacons, Files and Other Fake ObjectsHoneythings Track
(Adel Karimi and Ben Whitham)
Location:TBC09:00 - 12:30 -
Capture The FlagKara Nance and Brian Hay
Location:TBC09:00 - 17:00 -
Lunch12:30 - 13:30
-
Investigating Malicious Office and PDF Documents Part 2Analyzing Malicious Files Track
( TBC)
Location:TBC13:30 - 17:00 -
Android Reverse Engineering - Part 2Malware Track
(Hugo Gonzalez and Hanno Lemoine)
Location:TBC13:30 - 17:00 -
Setting up glutton (full traffic), looking at the live data and working on an extensionHoneythings Track
(Lukas Rist)
Location:TBC13:30 - 17:00