A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Logging for Hackers, How you can catch them with what you already have and a walk through of an actual attack and how we caught it. - Michael Gough (ShowMeCon 2016) (Hacking Illustrated Series InfoSec Tutorial Videos)

Logging for Hackers, How you can catch them with what you already have and a walk through of an actual attack and how we caught it.
Michael Gough

ShowMeCon 2016
http://www.showmecon.com

Advanced attacks are hitting enterprises more often than ever before. When such an attack hits your organization can you detect it in one hour? One day? What if I were to tell you that I could compromise your backup, management and Anti-Virus software and

Bio: Michael is a CISSP, CISA and CSIH with 20 years experience in IT and Information Security and is currently in the Healthcare sector. In the past, Michael has been a senior security consultant for Hewlett Packard and other consultancies as well as a security analyst in the financial and Health Care sectors and the State of Texas. Michael now focuses his talents as a Blue Team Defender, Incident Responder, malwarian fighter and malware archeologist, protecting his employer from nefarious ne`er-do-wellers. Michael also ran, with his partner, the BSides Texas Conference entity for 6 years with events in Dallas, Houston, San Antonio and Austin. Plus, he led the BSides Austin conference helping the community improve their information Security talents. In 2012, Michael discovered malware impacting the gaming industry known as WinNTI, 10 months before Kasperski released their public report on WinNTI. Michael also discovered and exploited a major Card Key system flaw back in 2010 which can be found on YouTube. In addition, Michael is co-creator of LOG-MD, a free Windows logging and malicious behavior discovery tool to help defenders improve their Windows logging, discover malicious behavior and malware for Blue Teamers and Incident Responders. Michael also created the “Malware Management Framework”, a process to help discover and manage malware programs. Lastly, Michael developed several “Windows Logging Cheat Sheets” to provide a starting point on detailed logging for Windows hosts, all of which can be found on his website: Malware Archaeology.com

Back to ShowMeCon 2016 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2016, IronGeek
Louisville / Kentuckiana Information Security Enthusiast