Главная
Study mode:
on
1
Intro
2
My experience at Black Hat
3
What is Black Hat
4
Black Hats Infrastructure
5
Supporting Infrastructure
6
Events
7
Volunteers
8
Network
9
Security
10
Wired Infrastructure
11
Handmade Cables
12
Network Problems
13
How it was fixed
14
Segmenting the network
15
Quality of service
16
Gateway laptop
17
Threat modeling
18
External attackers
19
Internal attackers
20
Threat models
21
Wireless security
22
Other Black Hat networks
23
Wireless spoofing
24
Black Hat is a nice network
25
Design goals
26
Keeping it simple
27
No services right
28
Europe
29
End Results
30
Lessons Learned
31
Security is never a priority
32
Building security into operations
33
Market yourself
Description:
Explore the intricacies of Black Hat's infrastructure in this 44-minute conference talk presented by Conan Dooley at the 44CON Information Security Conference. Dive into the challenges of maintaining a reliable wired training network for nearly two thousand attendees and discover the techniques used to keep the wireless network operational for continuous social media activity. Learn about the creation process, potential attackers, and defense strategies employed. Gain insights into network segmentation, quality of service implementation, threat modeling, and wireless security measures. Examine the design goals, including simplicity and minimal services, and understand how security is integrated into operations. Uncover valuable lessons on prioritizing security and effectively marketing oneself in the information security field.

Lessons Learned from Black Hat’s Infrastructure - The Tweets Must Flow

44CON Information Security Conference
Add to list
0:00 / 0:00