Overview
Syllabus
Intro
Bad hosts
The UFP
Problem with the UFP
The circle despair
Why is wiping the box
What is happening
Who is the attacker
Active attacker
What we typically get
Typical timeline
EM Trends
What can you do
Missed opportunities
Look after your Intel
Protect your information
Telegraph your activities
ENOS
Day slots
Deploying agents
Pentest vs Redteam
They know how to
How we can detect them
OPSEC fails
Sector synchronized isolation
Scenario
How long does it take
Theyre the after bad guy
Weve got some great people
WhackaMole
Mass simultaneous system remediation
Full visibility
Balls of steel
Rebuild
Sector synchronized
Hostile asset recovery
Play a game
Burn Intel
DEFCON Group
Taught by
44CON Information Security Conference