Day 1 | 04 October 2004 |
---|---|
TC - PROGRAM | |
08:30 - 08:40 | Introductions |
08:40 - 10:10 | Mark Dowd (ISS) Professional Exploit Development Techniques/Practices; Presentation, demonstration, discussion. |
Coffee break | |
10:40 - 11:40 | Robert Hensing (Microsoft) Rootkit detection on live systems and on-line incident response using a live response toolkit; Presentation and discussion. |
11:40 - 12:10 | Klaus-Peter Kossakowski (PreSecure) and Don
Stikvoort (Elsinore) Extended services of the "Trusted Introducer" for CSIRTs in Europe, including statistics gathering, in-band and out-of-band alerting and a multi-protocol re-encrypting mail gateway; Short presentation with open questions. |
Lunch break | |
13:30 - 14:00 | Wietse Venema (IBM) Journaling file system forensics; Short presentation. |
14:00 - 14:40 | Michael H. Warfield (ISS) Wireless Security - State of 802.11 (and variants) security profiles, developments, and practices; Presentation and discussion. |
14:40 - 15:10 | Masato Terada (JPCERT/CC) JVN - JP Vendor Status Notees; JPCERT activities of Vulnerability and Exploit DEF |
15:10 - 15:40 |
The FIRST Steering Committee Members ask the SC |
Tea break | |
16:25 - 17:00 | Errol Weiss (SAIC) World Wide ISAC Presentation (discussion in the panel afterwards) |
17:00 - 17:40 |
Panel discussion on the cooperation of ISACs and
CSIRTs
ISS organises a short tour of the facility for those interested. |
Day 2 | 05 October 2004 |
---|---|
from 08:30am onwards | HANDS-ON WORKSHOP
Coordinators: Wietse Venema and Jacomo Picollini. Instructors:
Below is a list of hands-on exercises and demos. Each exercise or demo will run once in the morning and once in the afternoon, and can accommodate about 8-10 students.
|
Analysis of binaries found on compromised
systems
MD5 and SHA-1 in Evidence Files and tool
demonstration
Malware analysis
Introduction to Windows Online Forensics
(WOLF) This is a follow-up on Robert Hensing's TC presentation about
rootkit detection on live systems and on-line incident response using a
live
|
Errol S. Weiss (SAIC)
Explanation of the worldwide ISAC.
MD5: 05085a30e4a85ee371d10050adc72862
Format: application/pdf
Last Update: June 7th, 2024
Size: 980.52 Kb
Robert Hensing (Microsoft)
Rootkit detection on live systems and on-line incident response using a live response toolkit; Presentation and discussion.
MD5: cfdb20b23a31a2e221a01e07855266e3
Format: application/pdf
Last Update: June 7th, 2024
Size: 333.42 Kb