Breaching the External Network Security Perimeter

Live Webinar

   Wednesday, July 19, 2017

 8:00 AM PDT | 11:00 AM EDT | 3:00 PM GMT

45 minutes followed by a live 15-minute Q&A

 

Registration closes in:

DaysHoursMinutesSeconds
 

Network security device vendors have done a good job of preventing or minimizing external attacks on enterprise network infrastructure by adding a range of capabilities to their products, such as access control, IPS, VPN, DLP, antivirus, and other threat prevention measures. Now attackers are looking for innovative ways of gaining access to valuable enterprise data. In this webinar, we will explore various techniques attackers employ to bypass protections and gain access to an internal network—having no special resources other than information publicly available over the Internet.

In this webinar, we’ll discuss Open Source Intelligence OSINT - intelligence collected from publicly available - its importance and applications. We will talk about how attackers obtain OSINT data, identify potential targets, and craft targeted attacks against them, demonstrating how seemingly harmless data can be used to compromise critical infrastructure. Finally, we’ll discuss various protection mechanisms an enterprise can use to prevent attacks and to defeat attackers with malicious intent.


Breaching the External Network Security Perimeter

About this Webinar:

  • The problem – why do we care about such attacks?
  • Open Source Intelligence (OSINT)
    • What is OSINT?
    • Why is it important?
    • How to perform effective data gathering?
  • Vertical vs horizontal brute-force attacks
  • Identifying publicly accessible targets
  •  Attacking the infrastructure
    • Defeating 2-factor authentication
    • Malicious Outlook Rules
    • Citrix application access and breakout
  • Gaining and maintaining access to the internal network
  • Escalating access on the internal network
  • Data exfiltration
  • The solution – what can we do to protect our infrastructure against such attacks?

  • 15-minute live Q&A session with Spirent security experts



Date: Wednesday, July 19, 2017

Time: 8:00 AM PDT | 11:00 AM EDT | 3:00 PM GMT

45 minutes followed by a live 15-minute Q&A

Register Today


To our customers: We'll never sell, distribute or reveal your email address to anyone. Privacy Policy

Saurabh Harit

Managing Consultant SecurityLabs

Spirent

Saurabh Harit is seasoned security professional and has delivered countless penetration testing & security consulting services to organization across the globe. Prior to joining Spirent, he had worked at several reputed security consulting firms such as Trustwave, Security Compass, SensePost and Honeywell. During his industry experience of over 12 years, Saurabh has worked across diversified industry verticals such as Banking, Aerospace, building solutions, Process & Control Systems and has developed expertise is various aspects of Information security. Saurabh specializes in web application & network penetration testing, with a secret crush on binary reverse engineering. He has contributed towards proof-of-concept exploits and white papers in the infosec domain as well as delivered security trainings to various fortune 500 clients globally and at reputed security conferences such as CansecWest and BlackHat USA. Saurabh has presented his research at several security conferences including Derbycon, Toorcon, BSides Toronto, Hack3rcon & BlackHat Europe and is author of the open-source tool, Yasuo (https://github.com/0xsauby/yasuo).