Lessons Learned from Black Hat’s Infrastructure - The Tweets Must Flow
Offered By: 44CON Information Security Conference via YouTube
Course Description
Overview
Explore the intricacies of Black Hat's infrastructure in this 44-minute conference talk presented by Conan Dooley at the 44CON Information Security Conference. Dive into the challenges of maintaining a reliable wired training network for nearly two thousand attendees and discover the techniques used to keep the wireless network operational for continuous social media activity. Learn about the creation process, potential attackers, and defense strategies employed. Gain insights into network segmentation, quality of service implementation, threat modeling, and wireless security measures. Examine the design goals, including simplicity and minimal services, and understand how security is integrated into operations. Uncover valuable lessons on prioritizing security and effectively marketing oneself in the information security field.
Syllabus
Intro
My experience at Black Hat
What is Black Hat
Black Hats Infrastructure
Supporting Infrastructure
Events
Volunteers
Network
Security
Wired Infrastructure
Handmade Cables
Network Problems
How it was fixed
Segmenting the network
Quality of service
Gateway laptop
Threat modeling
External attackers
Internal attackers
Threat models
Wireless security
Other Black Hat networks
Wireless spoofing
Black Hat is a nice network
Design goals
Keeping it simple
No services right
Europe
End Results
Lessons Learned
Security is never a priority
Building security into operations
Market yourself
Taught by
44CON Information Security Conference
Related Courses
IoT Device Security: Executive BriefingPluralsight Defense Evasion with ProxyChains
Pluralsight Lateral Movement with Infection Monkey
Pluralsight Get Started with Network Security
Salesforce via Trailhead AWS Security Best Practices: Network Infrastructure
Amazon Web Services via AWS Skill Builder