Blue teams are often sent scrambling whenever a new critical vulnerability drops. Unfortunately, while teams are busy clarifying if they are exposed, hackers are already working against you.
Evan Anderson, Director of Offense at Randori and SANS David Cowen break down how they analyze N-Day vulnerabilities, develop POCs and cut through the FUD of exploitability claims made on twitter to triage N-Day claims and weaponize those deemed viable into stable, deployable exploits.
Attendees will leave the webinar with instructions on how to develop their own custom exploit and the steps needed to duplicate the lab in their environment.
About the Speakers:
Evan Anderson: Evan is the Director of Offense at Randori. He has over 15 years of experience in red teaming, vulnerability research and exploit development and is a long time member of the NCCDC Red Team. Prior to co-founding Randori, he worked at Kyrus Technologies supporting commercial and federal projects.
David Cowen: David is a Managing Director at KPMG LLP, where he and his team of expert digital forensics investigators pushes the boundaries of what is possible on a daily basis. He’s also a certified SANS instructor—teaching FOR500: Windows Forensic Analysis—and he keeps up his information security knowledge by acting as the Red Team Captain for the National Collegiate Cyber Defense Competition, a role he’s held for the last nine years.