"Knowledge is power" may be something of a cliché, but it's absolutely true when it comes to gathering and exploiting intel. Knowledge brings victory, so those better versed in acquiring it will prosper. Both of today's Black Hat Asia 2015 Training highlights delve into generating and using intel, but come at the topic from two distinct places.
First up, forensics, which is all about finding, preserving, and extracting useful evidence. That's no different when the crime scene happens to be on a network. A key difference, of course, lies in the techniques and tools of the trade, which is where Black Hat expertise comes in handy. Network Forensics, Black Hat Asia Edition will give you hands-on experience analyzing covert channels, carving cached web pages out of proxies, identifying attackers and victims using flow records, carving malware from packet captures, and correlating the evidence to build a solid case. Students will also receive a fully loaded virtual forensics workstation, designed by experts and exclusive to this course. Not included: caffeine, so bring some.
The U.S. Special Operations Forces are fans of acronyms, and one of them, F3EAD, stands for Find, Fix, Finish, Exploit, Analyze, and Disseminate, which just so happens to describe their preferred methodology for taking out networks of enemy combatants. But what applications does F3EAD have outside of anti-terrorism? For the answers you'll want to attend Intelligence Driven Security, which will show cyber defense teams how to incorporate these intelligence practices into daily operations and take a 50,000-foot view of a cyber-adversary's operations. More of a wide-ranging journey than a deep dive into any one topic, this Training aims to impart the ways and means of applying intelligence to enterprise defense.
Have you booked your trip yet? There's still plenty of time to secure your Black Hat Asia 2015 attendance at early bird rates.