Core Security’s Capture the Flag cyber-range is designed around a rich and fictional, yet realistic, healthcare organization: Mercy Tech Healthcare. Filled with a complete, functioning infrastructure, including novel simulated medical devices, participants will have to opportunity to engage in instructor led tactical missions involving both offensive and defensive techniques.
The Capture the Flag is an excellent opportunity to safely practice techniques in a “cyber range” and to develop and hone skills using a variety of tools, including Core Security’s Impact Pro Software.
Participants will be required to bring a laptop computer that is capable of connecting to a wireless network, and connecting to a Microsoft Remote Desktop Services connection.
Host-based security monitoring has become increasingly important as the number and severity of threats keeps growing. In addition, network security monitoring tools are now harder to deploy, and not as efficient as they used to be.
Another driver for the adoption of host-based monitoring tools is the increased need to comply with security regulations (e.g. PCI DSS).
Wazuh started as a fork of the OSSEC project, and has quickly evolved into a more comprehensive solution. It now integrates OpenSCAP and Elastic Stack providing additional security monitoring and analysis capabilities.
In this session we will show you how to deploy and use Wazuh to:
Core Security’s Capture the Flag cyber-range is designed around a rich and fictional, yet realistic, healthcare organization: Mercy Tech Healthcare. Filled with a complete, functioning infrastructure, including novel simulated medical devices, participants will have to opportunity to engage in instructor led tactical missions involving both offensive and defensive techniques.
The Capture the Flag is an excellent opportunity to safely practice techniques in a “cyber range” and to develop and hone skills using a variety of tools, including Core Security’s Impact Pro Software.
Participants will be required to bring a laptop computer that is capable of connecting to a wireless network, and connecting to a Microsoft Remote Desktop Services connection.
This workshop will instruct attendees on how to carry out sophisticated wireless attacks against corporate infrastructure. Attendees will learn how to attack and gain access to WPA2-Enterprise networks, bypass network access controls, and perform replay attacks to gain administrative control over an Active Directory environment. External wireless adapters and preconfigured live USBs will be provided to all workshop attendees, and material learned in the lectures will be practiced within a realistic lab environment. Areas of focus include: