I had the distinct honor and pleasure of speaking at the “From The Source” Conference (FTSCon) on 21 Oct, in Arlington, VA. This was a 1-day event put on prior to the Volexity memory analysis training, and ran two different tracks…Maker and Hunter…with some really great presentations in both tracks!
<
div>Before I start in with providing my insights and observations, I wanted to point out that the proceeds of the event went to support Connect Our Kids, a really cool project to get folks, and especially kids, connected with birth parents, etc.
Keynote
Sean Koessel and Steven Adair provided the keynote, which was a look into a fascinating case they worked. In this case, the threat actor gained access to their customer by compromising near-by infrastructures and traversing/moving laterally via the wireless networks; hence the title, “The Nearest Neighbor Attack”. Sean and Steven put a lot of effort into crafting and delivering their fascinating story, all about how they worked through this incident, with all of the bumps, detours, and delays along the way. They also promised that they’d be putting together a more comprehensive review of the overall incident on the Volexity blog, so keep an eye out.
Something Sean said at the very beginning of the presentation caught my attention, and got me thinking. He referred to the incident as something, “…no one’s ever seen before.” As Sean and Steven described this particular incident, it was mo
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
Read the original article: