Hacking Exposed Live Webcast Series: TOR ALL THE THINGS
- Friday, September 27th, 2013 at 1:00 PM EDT (17:00:00 UTC)
- George Kurtz, Jason Geffner, and Moderated by John Pescatore, SANS Director of Emerging Security Trends
You can now attend the webcast using your mobile device!
Join George Kurtz, author of the best-selling security book Hacking Exposed, and his team of top technical experts for quarterly live webcasts featuring cutting-edge cyber security topics, discussions, and live demonstrations.
The global Tor network and its routing protocols provide an excellent framework for online anonymity. However, the selection of Tor-friendly software for Windows is sub-par at best.
Want to anonymously browse the web? Youre stuck with Firefox, and dont even think about trying to anonymously use Flash. Want to dynamically analyze malware without letting the C2 server know your home IP address? Youre outta luck. Want to anonymously use any program that doesnt natively support SOCKS or HTTP proxying? Not gonna happen.
While some solutions currently exist for generically rerouting traffic through Tor, these solutions either dont support Windows, or can be circumvented by malware, or require an additional network gateway device.
Join this live session as Jason Geffner dives into Tortilla, a free open-source tool to securely, anonymously, and transparently route all TCP/IP and DNS traffic through Tor, regardless of the client software, and without relying on VPNs or additional hardware or virtual machines. In addition to discussing the architecture of Tortilla, Geffner will show live demos of Tortilla being used for security research and penetration testing.
Serial entrepreneur George Kurtz co-founded CrowdStrike, a cutting-edge, big data, security technology company focused on helping enterprises and governments protect their most sensitive intellectual property and national security information. Kurtz is an internationally recognized security expert, author, entrepreneur, and speaker. He has more than 20 years of experience in the security space, including extensive experience driving revenue growth and scaling small and large organizations. His entrepreneurial background and ability to commercialize nascent technologies has enabled him to drive innovation throughout his career by identifying market trends and correlating them with customer feedback, resulting in rapid growth for the businesses he has run. His prior roles at McAfee, a $3-billion security company, include Worldwide Chief Technology Officer and GM, as well as SVP of Enterprise. Prior to joining McAfee, Kurtz started Foundstone in October 1999 as the founder and CEO responsible for recruiting the other six founding team members. Foundstone, a world wide security products and services company, had one of the leading incident response practices in the industry, and was acquired by McAFee in October of 2004. He also authored the best-selling security book of all time, Hacking Exposed: Network Security Secrets & Solutions.
Jason Geffner joined CrowdStrike in 2012 as a Sr. Security Researcher, where he performs in-depth reverse engineering of highly complex malware and exploits developed by nation-states and organized crime groups. His intelligence research attributes malware, exploits, lateral movement tools, and command-and-control protocols to unique actors. Geffner authors comprehensive reports for the technology, industrial, financial, energy, and government sectors to provide actionable intelligence for customers to understand who is attacking them, how they're being attacked, what information is being stolen, and how to defend their systems and raise the bar against the attackers. Before joining CrowdStrike, Geffner worked for NGS Secure from 2007-2012 as a Principal Security Consultant where he focused on performing security reviews of source code and designs, reverse engineering software protection methods and DRM protection methods, penetration testing web applications and network infrastructures, and developing automated security analysis tools. Prior to joining NGS, Geffner spent three years as a Reverse Engineer on Microsoft Corporation's Anti-Malware Team, where his work involved analyzing malware samples, de-obfuscating binaries, and writing tools for analysis and automation. Geffner holds several patents in the fields of reverse engineering and network security. He has been a Program Committee member of the Reverse Engineering Conference (REcon) and of the International Conference on Malicious and Unwanted Software. He's a regular trainer and speaker at Black Hat and other industry conferences, is often credited in industry talks and publications, and has been actively reverse engineering and analyzing software protection methods since 1995.