Lessons Learned from Black Hat’s Infrastructure - The Tweets Must Flow
Offered By: 44CON Information Security Conference via YouTube
Course Description
Overview
Explore the intricacies of Black Hat's infrastructure in this 44-minute conference talk presented by Conan Dooley at the 44CON Information Security Conference. Dive into the challenges of maintaining a reliable wired training network for nearly two thousand attendees and discover the techniques used to keep the wireless network operational for continuous social media activity. Learn about the creation process, potential attackers, and defense strategies employed. Gain insights into network segmentation, quality of service implementation, threat modeling, and wireless security measures. Examine the design goals, including simplicity and minimal services, and understand how security is integrated into operations. Uncover valuable lessons on prioritizing security and effectively marketing oneself in the information security field.
Syllabus
Intro
My experience at Black Hat
What is Black Hat
Black Hats Infrastructure
Supporting Infrastructure
Events
Volunteers
Network
Security
Wired Infrastructure
Handmade Cables
Network Problems
How it was fixed
Segmenting the network
Quality of service
Gateway laptop
Threat modeling
External attackers
Internal attackers
Threat models
Wireless security
Other Black Hat networks
Wireless spoofing
Black Hat is a nice network
Design goals
Keeping it simple
No services right
Europe
End Results
Lessons Learned
Security is never a priority
Building security into operations
Market yourself
Taught by
44CON Information Security Conference
Related Courses
Supply Chain Unchained - How To Be A Bad SaaS44CON Information Security Conference via YouTube Aviation Security 101
44CON Information Security Conference via YouTube The Anti-Checklist Manifesto
44CON Information Security Conference via YouTube Why Are We Still Doing Authentication Wrong?
44CON Information Security Conference via YouTube What Do Hackers See When They Look at the Clouds
44CON Information Security Conference via YouTube