Already at the 7th edition, the event continued to emphasize through sparkling debates about sensitive topics regarding cyber security but also through the famous international competition – DefCamp Capture the Flag. At the event, Romanian and foreign speakers presented fresh news about cyber security, cyber warfare, IoT, identification and prevention mechanisms but also 0-days and new vulnerabilities doubled by the night sessions when specific case studies were presented.
Mohamed Bedewi - Building a Weaponized Honeypot
Mohamed Bedewi - Building a Weaponized Honeypot
In this presentation I will discuss the process of building a fully weaponized honeypot which can function on both application and network levels, I will also highlight with a live demonstration how it can effectively and robustly decoy, deanonymize, identify, attack and profile malicious users even if they’re behind TOR, VPN or Proxies automatically with zero human interaction.
Shah Sheikh - Building a Cyber SOC
- SIEM 2.0 – log collection, aggregation, analytics and correlation
- Contextual Threat Cases and Situational Awareness
- SOC 2.0 and its components to form an eco-system.
- Building Threat Intelligence and Early warning detection system within your command center.
- Some new concepts – OSINT and SOCMINT and how it helps.
- SOC Processes, Procedures and Workflows.
- Execution
Shah Sheikh - Building a Cyber SOC
- SIEM 2.0 – log collection, aggregation, analytics and correlation
- Contextual Threat Cases and Situational Awareness
- SOC 2.0 and its components to form an eco-system.
- Building Threat Intelligence and Early warning detection system within your command center.
- Some new concepts – OSINT and SOCMINT and how it helps.
- SOC Processes, Procedures and Workflows.
- Execution
See also: