Active Defense Helping Threat Actors Hack Themselves!
2
Why Active Defense?
3
Presentation Focus
4
Inspirations
5
Conventions Used
6
Protecting Legitimate Users
7
"robots.txt" files
8
Sitemap XML files
9
Directory Indexes
10
Authorized Users Only
11
The Roundtrip Roundkick
12
Subdomain Examples
13
Stomachvivor / Gross Out
14
Reflector Madness
15
Inside the source code
16
Going Nowhere Fast!
17
Pi to the Face
18
The Setup...
19
Inside "bookmarks.html"
20
CPU Impacts to Attackers
21
The Wrong Answer
22
Bobby Dropkick
23
Alternative Active Defense Options
24
Questions
Description:
Explore active defense strategies in cybersecurity through a conference talk that demonstrates how to turn the tables on threat actors. Learn about innovative techniques like the "Roundtrip Roundkick," "Stomachvivor," and "Reflector Madness" to protect legitimate users while creating obstacles for attackers. Discover how to leverage robots.txt files, sitemap XML files, and directory indexes to enhance security. Examine the impacts of these strategies on attackers' CPU usage and explore alternative active defense options. Gain insights into helping threat actors inadvertently compromise their own systems through clever defensive tactics.
Active Defense - Helping Threat Actors Hack Themselves