Home

Explore adventures in the underland: Forensic techniques against hackers evading the hook

%3CLINGO-SUB%20id%3D%22lingo-sub-866331%22%20slang%3D%22en-US%22%3EExplore%20adventures%20in%20the%20underland%3A%20Forensic%20techniques%20against%20hackers%20evading%20the%20hook%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-866331%22%20slang%3D%22en-US%22%3ECybercrime%20is%20a%20very%20lucrative%20business%20not%20just%20because%20of%20the%20potential%20financial%20return%2C%20but%20because%20it%20quite%20easy%20to%20get%20away%20with%20it.%20Sometimes%20hackers%20get%20caught%2C%20but%20most%20of%20the%20time%20they%20still%20run%20free.%20When%20it%20comes%20to%20operating%20system%20and%20after-attack%20traces%2C%20it%20is%20not%20that%20bad%20as%20all%20traces%20are%20gathered%20in%20one%20place%20%E2%80%93%20your%20infrastructure.%20Even%20though%20hackers%20use%20techniques%20to%20remain%20on%20the%20loose%2C%20it%20is%20possible%20by%20using%20forensic%20techniques%20to%20gather%20evidence%20in%20order%20to%20demonstrate%20what%20actually%20happened.%20During%20this%20super%20intense%20session%2C%20Paula%20demonstrates%20techniques%20used%20by%20hackers%20to%20hide%20traces%20and%20forensic%20techniques%20that%20indicate%20how%20these%20activities%20were%20performed.%20Extremely%20technical%20session!%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-866331%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EBRK3151%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Highlighted
Community Manager
Cybercrime is a very lucrative business not just because of the potential financial return, but because it quite easy to get away with it. Sometimes hackers get caught, but most of the time they still run free. When it comes to operating system and after-attack traces, it is not that bad as all traces are gathered in one place – your infrastructure. Even though hackers use techniques to remain on the loose, it is possible by using forensic techniques to gather evidence in order to demonstrate what actually happened. During this super intense session, Paula demonstrates techniques used by hackers to hide traces and forensic techniques that indicate how these activities were performed. Extremely technical session!

View this session in the session catalog

View session
Related Conversations