*Network Traffic Analysis*
Join us for the Women's Society of Cyberjutsu (WSC) Cybersecurity Workshop hosted from our Washington, DC location. This is a hands-on, practical workshop where you will put into practice those things you may have read or covered in a class. This is also a great way to keep your skills fresh if you’re a veteran.
Every workshop addresses beginner and advanced topic material. Beginners are encouraged to watch and learn as much as possible even though you may not have a clue. Exposure to new tools and techniques by watching will advance your learning process a lot quicker than trying to learn on your own. You will get to ask questions and see how it's done in the real world. Advanced attendees are encouraged to share and help answer "noob" questions as much as possible so everyone can learn from them.
Network traffic analysis looks at communication patterns between hosts on a network. It's the process of intercepting and examining packets in order to deduce information from patterns in communication. It can be performed even when the messages are encrypted and cannot be decrypted. Network traffic analysis can be used as an attacker tool or used as a defensive technique to identify anomalies in traffic patterns.
This workshop on network traffic analysis will give you an understanding of what different types of captured traffic look like and how they can be dissected for further investigation and/or creating IDS signatures. We'll use industry tools to carve out data from network packets as well as write signatures for detection devices. Finally, we'll look at recovering passwords hidden in zip files that need to be cracked.
We are pleased to have Terrence Kimbrough as our presenter. Terrence is a top cyber-security professional in the area of traffic analysis. After his 15 year span in the Marine Corp as a Computer Defense Specialist, he serves in the same capacity as a Reservist. He ventured into the civilian world and performed a number of Blue and Red team activities and has worked for such agencies as U.S. CyberComm and other Intelligence Community (IC) agencies. His insight has been incorporated into DoD policy and provided the foundations to multiple areas of network defense. His current assignment working for a Computer Network Defense Service Provider (CDNSP) gives him a platform to implement the tools and techniques of traffic analysis at a granular level.
- You must bring your own laptop.
- Must be installed with Virtualbox.
- Download the Backtrack virtual machine here and extract. Download version 5R3, Gnome, 32bit, VMware. There are issues with the 64bit version of 5R3, so download 5R2. If you've downloaded/installed Backtrack from a previous workshop, that can be used.
- You'll receive a link by email for the Windows image. Download and import into Virtualbox. This file is 600MB and will take some time to download.
- Instructions will be provided by email for the above.
- Knowledge of basic networking and IT.
- Good attitude, willingness to learn and share.
Once registered, you’ll receive the meeting participation info by email the day of the workshop. Please have a working webcam/mic. Expect to join 15-30 minutes prior to test your technical configurations.
Register for onsite attendance here
Onsite - $20, Remote - $5
We only have room for 24 onsite so register early.
Refunds are offered if:
- The workshop is cancelled
- You cancel at least 1 day before the workshop; by 1000am Friday (3/1) morning
Earn CPE's towards your certification
Food & beverages are provided