CPE Cyber Attack Lab #1
Malware, C&C, and DNS Exfiltration
Wed, May 12 | 10:00 am ET
What's behind those malicious Word macros that users just love to enable?
Watch our IR team convince a user to open an infected document, giving us a reverse shell. We'll use that connection to recon the network, run a pass-the-hash attack, and sneak some top-secret data out via DNS tunneling.
Then learn, step-by-step, how you can use Varonis to run a fast and conclusive investigation—without wasting hours stitching logs or running reports.
If you would like ISC2 CPE credits for attending, please make sure to submit your ISC2 member number in the form.