Most pentesters have little knowledge regarding the residual trace data left behind by their activities. Likewise, most forensic investigators have only a rudimentary knowledge of how the attacks they investigate actually took place. What if you could see things from both sides? What if you could see both the attack as it happened, as well as the indicators of compromise (IOCs) left behind by the breach? Well, now you can. In Hack it, and Track it, experts from Trustwave SpiderLabs Network Penetration Testing team, and PSC’s Digital Forensics and Incident Response team will provide you with the opportunity to both compromise a target and forensically investigate that breach. You will use cutting edge tools and techniques from both disciplines which will undoubtedly help make you either a better penetration tester, or a better forensic investigator. Through the use of virtual machines, you will be led through three different real world scenarios typically seen by the experts at SpiderLabs. In each scenario, you will have to use your skills to compromise a host, and extract target data. Then, you will utilize the IOCs and trace evidence left behind by your activities to “tell the story” of what took place and how. This is the one of kind class and not to be missed! It will open up the eyes and minds of even the most seasoned pentesters or forensics investigators to a world of knowledge they likely no very little about. Do not miss your opportunity to Hack it, and Track it!
Pentesters and Forensic Investigators (Incident Responders)
Moderate knowledge of EITHER network pentesting or digital forensics.
• A laptop with enough memory to properly play virutal machine.
• VMware player
• Virutal Machine for Pentesting
• Virtual Machine for Investigating
• Tools DVD
• Trustwave Bag O Goodies
• Student Manual
Grayson Lenik
Nuix
Grayson Lenik is a Principal Security Consultant with the Cyber Threat Analysis team at Nuix where he leads the Forensics and Incident Response support team and teaches clients how to use the Nuix platform effectively. Grayson spent almost 5 years with Trustwave SpiderLabs as a senior security consultant and before that, worked as a System Administrator, Network Administrator and a Private Computer and Security Consultant. Until recently, He was the primary instructor for the US Secret Service Network Intrusion Responder Program. Grayson authors the forensics blog "An Eye on Forensics" and has spoken at Defcon, Sector, The Netdiligence Cyber Risk Forum, IAFCI, The USSS ECSAP Conference and many other security conferences. He has more than 15 years of industry experience and regularly trains private companies and law enforcement in digital forensic methodology and practice.
Ryan Linn
Managing Consultant
SpiderLabs Network Pentesting
Ryan Linn is a Senior Consultant with Trustwave's SpiderLabs -the advanced security team focused on penetration testing, incident response, and application security. Ryan is a penetration tester, an author, a developer,and an educator. He comes from a systems administration and Web application development background, with many years of IT security experience. Ryan currently works as a full-time penetration tester and is a regular contributor to open source projects including Metasploit and BeEF, the Browser Exploitation Framework.