| |||||
| |||||
Search Irongeek.com: ![]() ![]()
Help Irongeek.com pay for bandwidth and research equipment: |
This talk will discuss and give real world examples of deploying deception techniques to trick attackers into revealing their presence and intentions. The talk will focus on outing attackers at the earliest stages of an engagement, focusing first on using deception to detect and confuse OSINT gathering and attacks against external systems. We will then pivot to deploying simple deception objects on your internal network to detect compromises as early as possible. We will discuss using an attacker's methods and tools against themselves, giving an attacker the sort of data they hope for, only to use it to trigger alerts and shut them down. Lay down some traps, troll the attackers, make them swear and kick puppies. Jason is passionate about defending organizations often using unique and unexpected methods. Nothing makes him smile more than ticking off attackers and red teamers. He has worked for companies both large and small in manufacturing, healthcare, government contracting, retail, and the hospitality industries holding positions ranging from software development, infrastructure administration, security analyst, security manager, IT director, and systems architect. He also enjoys irritating his co-workers with his awful singing voice. Especially early in the morning.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast