Book Online Tickets for (ISC)2 Chennai Chapter- Exploring  Attac, Chennai.  
                                     (ISC)2 Chennai Chapter
Exploring an Attacker\'s Mind Map- Insight to Attack and exploitation techniques and Mem

(ISC)2 Chennai Chapter- Exploring Attackers Mind Map- Insight into Attack and exploitation techniques and Memory Forensics- One day Workshop

 

Invite friends

Contact Us

Page Views : 337

About The Event

 

                                     (ISC)2 Chennai Chapter

Exploring an Attacker's Mind Map- Insight to Attack and exploitation techniques and Memory Forensics - One day Workshop

 

The session is aimed at providing an insight into the concepts of attack techniques used by hackers to

exploit common vulnerabilities that persist in software and underlying protocols. To better understand the

exploitation techniques, we will use sample vulnerable programs / real world vulnerabilities (simulated)

1) Understanding the fundamentals

1.1. Overview about/ PC Architecture physical organization of a modern system

1.2. Memory Management

2) Attacks against Memory Segments

2.1 Stacks based buffer overflow attacks

2.2 Heap based buffer overflow attack

3) Amplification Attacks

4) Attacks against Hybrid Ciphers

Annexure – Need for memory based forensic analysis

The session is aimed at introducing the concept of memory forensics. This presentation will provide an

insight into malware behavior and a variety of stealth techniques used by malware authors. We will focus

on concepts and techniques relating to Windows.

Note: Basic understanding of C programming will be an advantage, but not strongly required.

7 CPE Hours is awarded for attending this event

 

Speaker : Sriram Krishnan

 

Sriram Krishnan is a Cyber Security professional with 10.7 years of experience encompassing software development and security consulting. He has worked with a leading internet service provider, big 4 consulting firm and global banks. He has been involved in development of network security product and has performed penetration testing, security architecture review, and advised on security best practices for global telecom industry, banking and financial services sector, and government entities. He has performed threat assessment for the largest project initiated by the Indian Government in providing unique identification number to residents across the country. He has been speaker at international and national security conferences and has delivered training/workshop for organizations in both offensive and defensive security.


Terms & Conditions

Tickets once paid will not be refunded to the participant incase of participant's absenteeism for the event.

 

Venue Map