1. Moscone West

In the last few years, we have seen a number of classified documents leaked from Wikileaks. This includes the data dump from the CIA’s entire hacking arsenal, which has been named Vault 7. The presenter sought to implement an attack capability based on information available to the public to see whether an individual could glean enough information to build their own cyberespionage tool.

Learning Objectives:
1: Understand why you should test your security posture against real-world threats.
2: Understand how to empower your offensive security team to think like an attacker.
3: Learn why custom tools can be so devastating to your environment.

Command and Control “C2” infrastructure; Python; C++.

Download pdf