A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Destruction as a Service: Security Through Reanimation - Jon Medina (BSides Augusta 2015) (Hacking Illustrated Series InfoSec Tutorial Videos)

Destruction as a Service: Security Through Reanimation
Jon Medina

The continuously changing security landscape poses new challenges almost daily. Some of these threats must to be met with dynamic response measures. However many threats at their core have certain fundamental concepts: hard drive persistence, ram manipulation, file and directory obfuscation, and corruption of legitimate running processes among many others. The advent of server and network device virtualization provides an entirely new flexibility and control over the status and security of these devices.This talk will demonstrate a means in which production servers and software defined network infrastructure can be destroyed and redeployed cyclically around the clock in minutes or even seconds in a way that is completely transparent to the user.

Back to BSides Augusta 2015 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2016, IronGeek
Louisville / Kentuckiana Information Security Enthusiast