Saturday, May 9, 2026
World News Prime
No Result
View All Result
  • Home
  • Breaking News
  • Business
  • Politics
  • Health
  • Sports
  • Entertainment
  • Technology
  • Gaming
  • Travel
  • Lifestyle
World News Prime
  • Home
  • Breaking News
  • Business
  • Politics
  • Health
  • Sports
  • Entertainment
  • Technology
  • Gaming
  • Travel
  • Lifestyle
No Result
View All Result
World News Prime
No Result
View All Result
Home Business

Conference Hopping: Training Attendee Scanning Def Con

September 3, 2025
in Business
Reading Time: 6 mins read
0 0
0
Conference Hopping: Training Attendee Scanning Def Con
Share on FacebookShare on Twitter


Background: The Distinctive Panorama of the Black Hat NOC

Working the Black Hat Safety and Community Operations Heart (NOC) presents a singular set of challenges and expectations. Not like a typical company atmosphere the place any hacking exercise is instantly deemed malicious, the Black Hat convention is a nexus for cybersecurity analysis, coaching, and moral hacking. Consequently, we anticipate and even count on a major quantity of exercise that, in different contexts, can be thought-about extremely suspicious or outright hostile. This contains numerous types of scanning, exploitation makes an attempt, and different adversarial simulations, usually performed as a part of official trainings or impartial analysis.

Including to this complexity is the Carry Your Personal System (BYOD) nature of the convention community. Attendees join a wide selection of private gadgets, making conventional endpoint telemetry (like EDR options) a major problem for complete monitoring. As such, our main focus was on sturdy network-based telemetry for detection and menace looking.

Overview

This writeup particulars a latest investigation throughout the Black Hat Safety and Community Operations Heart (SNOC), highlighting the essential function of built-in safety instruments and early detection in mitigating potential threats, notably when originating from inside a high-profile coaching atmosphere.

On August 4, 2025, a Cisco XDR analytics alert flagged “Suspected Port Abuse: Exterior – Exterior Port Scanner.” The alert indicated an inner host from the “Defending Enterprises – 2025 Version” coaching room was actively focusing on an exterior IP tackle, which resolved to a website belonging to the Def Con cybersecurity convention. This exercise aligned with the MITRE ATT&CK framework’s Reconnaissance tactic (TA0043), particularly the Energetic Scanning method (T1595).

Investigation Workflow: A Multi-Instrument Strategy to Speedy Response

Part 1: Assault Triage With Cisco XDR

The Cisco XDR analytics incident offered the preliminary alert and connection flows, providing speedy visibility into the suspicious community exercise. Detecting this on the reconnaissance section is essential, as early detection within the MITRE ATT&CK chain considerably reduces the chance of an adversary progressing to extra impactful levels.

We noticed a excessive confidence incident involving two IP addresses from an inner subnet connecting with a single exterior IP tackle. The related alert was categorized as a suspected port abuse by Cisco XDR.

Cisco XDR’s ‘Examine’ function then allowed us to additional drill down into and visualized the connection flows related to that exterior IP tackle. It additionally searched in opposition to a number of menace intelligence sources for any fame related to the observables. The exterior host was not discovered to have a malicious fame.

Part 2: Goal Identification With Cisco Umbrella

We used Cisco Umbrella (DNS resolver) to verify that the goal IP resolves to a single area. The area seems to be owned by Def Con and hosted in the USA, by Comcast. The direct affiliation with the Def Con Cybersecurity Convention instantly raised issues about unauthorized reconnaissance in opposition to one other main occasion’s infrastructure.

Cisco Umbrella good search lookup of the area confirmed that the area has a low threat and is assessed below the “Hacking/Conventions” class. It was confirmed by Cisco Umbrella to belong to the Def Con conference.

Part 3: Site visitors Evaluation

Analyzing the NetFlow visitors in XDR analytics offers us an instantaneous perception that port scanning has probably occurred.

Pivoting into Cisco Firepower Administration Console (FMC), we ran a report of the related visitors from the Cisco Firepower Administration Console.

The report graphed the highest 100 vacation spot ports related to the visitors and painted a really clear image. It confirmed that the interior host was systematically scanning numerous ports on the exterior goal. Notably, we excluded frequent net ports like 80 and 443, which helped us keep away from doubtlessly official visitors. Every port was scanned exactly 4 occasions, indicating a methodical, automated exercise, fully in line with a devoted port scan.

Fig. 1: Cisco FMC report on prime 100 vacation spot ports

For additional validation and quantification, we then queried Palo Alto Networks firewall logs in Splunk Enterprise Safety (ES). The Splunk question confirmed 3,626 scanning occasions between 2025/08/04 17:47:07 and 2025/08/04 18:20:29.

Constant port counts additional validated automated scanning.

Part 4: Offender Identification

Using our staff’s Slack Bot API, which is built-in with Palo Alto Cortex XSIAM, we have been in a position to shortly establish the supply machine. This included its MAC tackle and hostname, and we pinpointed it as working straight from the Black Hat coaching room, particularly ‘Defending Enterprises – 2025 Version’:

Lastly, we have been in a position to seize the complete PCAP of the visitors as further proof, utilizing our full packet seize instrument, Endace Imaginative and prescient. This investigation confirmed that the unauthorized scanning originated from a scholar in a coaching room. The offender was shortly recognized and instructed to stop the exercise. The incident was then closed, with continued monitoring of the coaching room and its contributors.

Potential Dangers Highlighted by the Incident

Reputational Harm: Such incidents can harm the fame of Black Hat as a premier cybersecurity occasion, eroding belief amongst contributors, companions, and the broader safety group.

Facilitating illegal Exercise: Extra critically, if left unchecked, these actions may result in Black Hat infrastructure being leveraged for illegal exercise in opposition to exterior third events, doubtlessly leading to authorized repercussions and extreme operational disruptions. Swift detection and remediation are important to uphold belief and forestall such outcomes.

Decision and Key Takeaways: Imposing Coverage and the Worth of Swift Motion

The investigation confirmed unauthorized scanning originating by a scholar. Following this, the offender was shortly recognized and made to stop the exercise. The incident was closed, with continued monitoring of the coaching room.

The Criticality of Early Detection: This case exemplifies the worth of detecting adversarial exercise on the Reconnaissance section (TA0043) through methods like Energetic Scanning (T1595). By figuring out and addressing this habits early, we prevented potential escalation to extra damaging ways in opposition to an exterior goal.

Built-in Tooling: The seamless integration of Cisco XDR, Cisco Umbrella, Cisco FMC, Splunk ES, Slack API integration, Endace Imaginative and prescient and Palo Alto Cortex XSIAM enabled speedy detection, detailed evaluation, and exact attribution.

Vigilance in Coaching Environments: Even in managed, academic settings like Black Hat, steady monitoring and swift response are paramount. The dynamic nature of such environments necessitates sturdy safety controls to forestall misuse and preserve community integrity.

Coverage Enforcement: Clear communication and constant enforcement of community utilization insurance policies are important to handle expectations and forestall unauthorized actions, whether or not intentional or experimental.

About Black Hat

Black Hat is the cybersecurity business’s most established and in-depth safety occasion collection. Based in 1997, these annual, multi-day occasions present attendees with the most recent in cybersecurity analysis, growth, and developments. Pushed by the wants of the group, Black Hat occasions showcase content material straight from the group via Briefings displays, Trainings programs, Summits, and extra. Because the occasion collection the place all profession ranges and educational disciplines convene to collaborate, community, and focus on the cybersecurity matters that matter most to them, attendees can discover Black Hat occasions in the USA, Canada, Europe, Center East and Africa, and Asia. For extra info, please go to the Black Hat web site.

We’d love to listen to what you assume! Ask a query and keep linked with Cisco Safety on social media.

Cisco Safety Social Media

LinkedInFacebookInstagramX

Share:



Source link

Tags: AttendeeBlack HatCisco Breach ProtectionCisco Secure AccessCisco Security CloudCisco TalosCisco User ProtectionCisco XDRConConferenceDefhoppingNetwork Operations Center NOCScanningSecurity Operations Center SOCSplunkSplunk CloudThousandEyesTraining
Previous Post

Major supermarket unveils tech that will tell you whether your avocado is ripe

Next Post

PMQs: Starmer bruised by Rayner’s stamp duty underpayment

Related Posts

Why the Next Wave of Entrepreneurs Is Putting Values Before Valuation
Business

Why the Next Wave of Entrepreneurs Is Putting Values Before Valuation

May 9, 2026
UK drivers could be denied car finance compensation as firms lodge legal battle
Business

UK drivers could be denied car finance compensation as firms lodge legal battle

May 8, 2026
Why Self-Storage Is The Quiet Backbone Of Entrepreneurship – Young Upstarts
Business

Why Self-Storage Is The Quiet Backbone Of Entrepreneurship – Young Upstarts

May 9, 2026
This is what happens when you speak to a financial adviser for the first time
Business

This is what happens when you speak to a financial adviser for the first time

May 9, 2026
After Addiction and Ironman Failure, This Founder Adopted a Rule That Changed Everything
Business

After Addiction and Ironman Failure, This Founder Adopted a Rule That Changed Everything

May 8, 2026
Blue chips falter amid wait for Middle East deal
Business

Blue chips falter amid wait for Middle East deal

May 7, 2026
Next Post
PMQs: Starmer bruised by Rayner’s stamp duty underpayment

PMQs: Starmer bruised by Rayner’s stamp duty underpayment

Where to Find the Best Tonkotsu Ramen in Fukuoka – Travel Dudes

Where to Find the Best Tonkotsu Ramen in Fukuoka - Travel Dudes

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

  • Trending
  • Comments
  • Latest
Kyrgyzstan Under the Khanstitution: 5 Years On

Kyrgyzstan Under the Khanstitution: 5 Years On

January 12, 2026
Injection π23 Tabula Rasa Brings Classic Survival Horror to Xbox Series X|S – Xbox Wire

Injection π23 Tabula Rasa Brings Classic Survival Horror to Xbox Series X|S – Xbox Wire

December 29, 2025
The 10 Most Beautiful Women in History According to AI

The 10 Most Beautiful Women in History According to AI

October 16, 2025
The Top 10 Websites of All Time According to AI

The Top 10 Websites of All Time According to AI

August 27, 2025
Retired? You may be eligible for the UAE 5-Year Retirement Visa: Eligibility, requirements, and benefits explained | World News – The Times of India

Retired? You may be eligible for the UAE 5-Year Retirement Visa: Eligibility, requirements, and benefits explained | World News – The Times of India

September 15, 2025
Tourism sector creates nearly 1 million direct jobs in South Africa

Tourism sector creates nearly 1 million direct jobs in South Africa

April 5, 2026
Spencer Pratt said ‘super meth’ is helping fuel L.A.’s homeless crisis. What is that?

Spencer Pratt said ‘super meth’ is helping fuel L.A.’s homeless crisis. What is that?

May 9, 2026
4 million pledged to save Spirit Airlines

$214 million pledged to save Spirit Airlines

May 9, 2026
Baku Initiative Group urges France to comply with UN calls

Baku Initiative Group urges France to comply with UN calls

May 9, 2026
Why saying hello to strangers can be good for you

Why saying hello to strangers can be good for you

May 9, 2026
Trump says he ‘might’ move US troops to Poland from Germany

Trump says he ‘might’ move US troops to Poland from Germany

May 9, 2026
Donald Trump congratulates John Swinney after SNP defeat Labour in Scotland

Donald Trump congratulates John Swinney after SNP defeat Labour in Scotland

May 9, 2026
World News Prime

Discover the latest world news, insightful analysis, and comprehensive coverage at World News Prime. Stay updated on global events, business, technology, sports, and culture with trusted reporting you can rely on.

CATEGORIES

  • Breaking News
  • Business
  • Entertainment
  • Gaming
  • Health
  • Lifestyle
  • Politics
  • Sports
  • Technology
  • Travel

LATEST UPDATES

  • Spencer Pratt said ‘super meth’ is helping fuel L.A.’s homeless crisis. What is that?
  • $214 million pledged to save Spirit Airlines
  • Baku Initiative Group urges France to comply with UN calls
  • About Us
  • Advertise With Us
  • Disclaimer
  • Privacy Policy
  • DMCA
  • Cookie Policy
  • Terms and Conditions
  • Contact Us

© 2025 World News Prime.
World News Prime is not responsible for the content of external sites.

No Result
View All Result
  • Home
  • Breaking News
  • Business
  • Politics
  • Health
  • Sports
  • Entertainment
  • Technology
  • Gaming
  • Travel
  • Lifestyle

© 2025 World News Prime.
World News Prime is not responsible for the content of external sites.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In