Active Defense Helping Threat Actors Hack Themselves!
3
About Me
4
Legal Disclaimer
5
What is Active Defense?
6
Our Objectives
7
Presentation Focus
8
Inspirations
9
Conventions Used
10
Protecting Legitimate Users
11
"robots.txt" files
12
Sitemap XML files
13
Directory Indexes
14
Authorized Users Only
15
The Roundtrip Roundkick
16
Subdomain Examples
17
Stomachvivor / Gross Out
18
Reflector Madness
19
Reward for cracking the login is?
20
Inside the source code
21
Going Nowhere Fast!
22
Pi to the Face
23
Inside "bookmarks.html"
24
The Wrong Answer
25
Bobby Dropkick
26
The Setup
27
Alternative Active Defense Options
28
Questions
29
Thank you for attending!
Description:
Explore active defense strategies in cybersecurity through a conference talk that demonstrates how to turn the tables on threat actors. Learn about innovative techniques to protect legitimate users, including the use of "robots.txt" files, sitemap XML files, and directory indexes. Discover creative methods like the "Roundtrip Roundkick" and "Reflector Madness" to confuse and misdirect potential attackers. Gain insights into subdomain examples, source code tricks, and alternative active defense options. Engage with practical demonstrations and thought-provoking scenarios that showcase how to make threat actors inadvertently hack themselves, ultimately enhancing your organization's security posture.
Active Defense - Helping Threat Actors Hack Themselves