University CenterUniversity of North Florida12000 Alumni DriveJacksonville, FL 32224-2678
Layne Wallace School of Computing University of North Florida 1 UNF Drive Jacksonville, FL 32224
Johannes Ullrich and Kevin Johnson
8-hour CPE with 5 power topics:
Time: 8:00am until 5:00pm
Menu: Breakfast, hot lunch, snacks
Cost: $200 or $150 if a member of ISACA, Infragard, ISSA, or IIA
Understanding your network is a first and critical step in detecting and preventing intrusions. In particular, the relatively new field of network forensics attempts to reconstruct events based on network packet captures, which may reveal data no longer recoverable from the compromised disk. This presentation will discuss basic network traffic "file carving" techniques. We will go over some covert channel techniques that do not leave any artifacts on the victims file system, and how to detect them and reconstruct payloads. In the second half, we will enter the new world of IPv6 and show how various tunneling mechanisms that are used by hosts to connect to IPv6 networks can be used. The presentation will include a large number of demonstrations and traffic samples as well as some tools and scripts will be made available to participants.
You will need to install the required software on your laptop for the hands-on exercises that will be done in class. A Linux VMware image is supplied for class exercises. Familiarity and comfort with entering commands via the command line will facilitate your experience with the hands-on exercises.
Before coming to the course, you will need to perform the following actions:
Organizations are under constant attack via the web applications they depend on to do business. In recent events, underground organizations such as LULSec and Anonymous are targeting and exploiting systems via SQL injection vulnerabilities. These vulnerabilities allow the attacker to gain access to an organization's data. In this presentation Kevin Johnson will explore some recent attacks, describe how various web application attacks work, and show live demonstrations of such attacks.
Attendees will gain a better understanding of how SQL attacks work and why web security problems are as severe as they are. The demonstrations will reflect the simplicity of the attack and how it can be used for much more than simple data exfiltration.
Don't forget your laptop to fully participate in these great learning events.
Network Packet Analysis Laptop Requirments
Mandatory laptop hardware requirements:
Web Application Security Testing Laptop Requirements
You must have the ability to disable the host firewall (Windows firewall or other third party firewall) and antivirus running on your desktop.
This usually means you need to have administrative privilege on the machine.
DO NOT plan on just killing your antivirus service or processes, because most antivirus tools still function even when their associated services and processes have been terminated.
Register by October 14 by sending the following information to
Leslie Deppe ℅ ICX Group Inc. 76 South Laura Street, Suite 1700 Jacksonville, FL 32202
Name: Title: Telephone: Company: Badge Name (First or Nickname): E-mail Address: Member of ISACA? (Yes/No): If Yes, include your affilliaton and member number:
Big thanks to ISACA for arranging this.
Copyright © 2012 University of North Florida1 UNF Drive | Jacksonville, FL 32224 | Phone: (904) 620-1000
Contact | Emergency | Privacy | RegulationsDisability Accommodations