Close Menu
Red Light Tips & Reviews
  • Shop
  • Beauty
  • Fitness
  • Hair Care
  • Luggage & Bags
  • Pet Supplies
  • Selfie Accessories
  • Supplements
What's Hot

Accomplice Enablement: Key to Accomplice Success

December 7, 2025

Fig Salad • Contemporary Fig Salad with Blue Cheese & Candied Walnu…

December 6, 2025

Hidden Hyperlinks Between Jobs & Well being

December 6, 2025
Red Light Tips & ReviewsRed Light Tips & Reviews
Facebook X (Twitter) Instagram
Donate
  • Shop
  • Beauty
  • Fitness
  • Hair Care
  • Luggage & Bags
  • Pet Supplies
  • Selfie Accessories
  • Supplements
Red Light Tips & Reviews
Home»Healthcare»Coaching Attendee Scanning Def Con
Healthcare

Coaching Attendee Scanning Def Con

RedlighttipsBy RedlighttipsSeptember 3, 2025No Comments7 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Telegram Email
Coaching Attendee Scanning Def Con


Background: The Distinctive Panorama of the Black Hat NOC

Working the Black Hat Safety and Community Operations Heart (NOC) presents a novel set of challenges and expectations. Not like a typical company setting the place any hacking exercise is straight away deemed malicious, the Black Hat convention is a nexus for cybersecurity analysis, coaching, and moral hacking. Consequently, we anticipate and even count on a major quantity of exercise that, in different contexts, could be thought-about extremely suspicious or outright hostile. This consists of numerous types of scanning, exploitation makes an attempt, and different adversarial simulations, usually carried out as a part of official trainings or unbiased analysis.

Including to this complexity is the Carry Your Personal Machine (BYOD) nature of the convention community. Attendees join a big selection of private units, making conventional endpoint telemetry (like EDR options) a major problem for complete monitoring. As such, our major focus was on sturdy network-based telemetry for detection and menace looking.

Overview

This writeup particulars a latest investigation inside the Black Hat Safety and Community Operations Heart (SNOC), highlighting the vital function of built-in safety instruments and early detection in mitigating potential threats, significantly when originating from inside a high-profile coaching setting.

On August 4, 2025, a Cisco XDR analytics alert flagged “Suspected Port Abuse: Exterior – Exterior Port Scanner.” The alert indicated an inner host from the “Defending Enterprises – 2025 Version” coaching room was actively focusing on an exterior IP handle, which resolved to a website belonging to the Def Con cybersecurity convention. This exercise aligned with the MITRE ATT&CK framework’s Reconnaissance tactic (TA0043), particularly the Energetic Scanning method (T1595).

Investigation Workflow: A Multi-Software Strategy to Fast Response

Part 1: Assault Triage With Cisco XDR

The Cisco XDR analytics incident supplied the preliminary alert and connection flows, providing fast visibility into the suspicious community exercise. Detecting this on the reconnaissance part is essential, as early detection within the MITRE ATT&CK chain considerably reduces the danger of an adversary progressing to extra impactful phases.

We noticed a excessive confidence incident involving two IP addresses from an inner subnet connecting with a single exterior IP handle. The related alert was categorized as a suspected port abuse by Cisco XDR.

Cisco XDR’s ‘Examine’ function then allowed us to additional drill down into and visualized the connection flows related to that exterior IP handle. It additionally searched in opposition to a number of menace intelligence sources for any repute related to the observables. The exterior host was not discovered to have a malicious repute.

Part 2: Goal Identification With Cisco Umbrella

We used Cisco Umbrella (DNS resolver) to substantiate that the goal IP resolves to a single area. The area seems to be owned by Def Con and hosted in the USA, by Comcast. The direct affiliation with the Def Con Cybersecurity Convention instantly raised considerations about unauthorized reconnaissance in opposition to one other main occasion’s infrastructure.

Cisco Umbrella good search lookup of the area confirmed that the area has a low threat and is assessed beneath the “Hacking/Conventions” class. It was confirmed by Cisco Umbrella to belong to the Def Con conference.

Part 3: Site visitors Evaluation

Analyzing the NetFlow site visitors in XDR analytics offers us an instantaneous perception that port scanning has possible occurred.

Pivoting into Cisco Firepower Administration Console (FMC), we ran a report of the related site visitors from the Cisco Firepower Administration Console.

The report graphed the highest 100 vacation spot ports related to the site visitors and painted a really clear image. It confirmed that the interior host was systematically scanning numerous ports on the exterior goal. Notably, we excluded widespread net ports like 80 and 443, which helped us keep away from taking a look at probably reputable site visitors. Every port was scanned exactly 4 occasions, indicating a methodical, automated exercise, solely in keeping with a devoted port scan.

Fig. 1: Cisco FMC report on high 100 vacation spot ports

For additional validation and quantification, we then queried Palo Alto Networks firewall logs in Splunk Enterprise Safety (ES). The Splunk question confirmed 3,626 scanning occasions between 2025/08/04 17:47:07 and 2025/08/04 18:20:29.

Constant port counts additional validated automated scanning.

Part 4: Wrongdoer Identification

Using our workforce’s Slack Bot API, which is built-in with Palo Alto Cortex XSIAM, we had been capable of rapidly determine the supply machine. This included its MAC handle and hostname, and we pinpointed it as working straight from the Black Hat coaching room, particularly ‘Defending Enterprises – 2025 Version’:

Lastly, we had been capable of seize the total PCAP of the site visitors as extra proof, utilizing our full packet seize device, Endace Imaginative and prescient. This investigation confirmed that the unauthorized scanning originated from a scholar in a coaching room. The offender was rapidly recognized and instructed to stop the exercise. The incident was then closed, with continued monitoring of the coaching room and its individuals.

Potential Dangers Highlighted by the Incident

  • Reputational Harm: Such incidents can injury the repute of Black Hat as a premier cybersecurity occasion, eroding belief amongst individuals, companions, and the broader safety neighborhood.
  • Facilitating illegal Exercise: Extra critically, if left unchecked, these actions may result in Black Hat infrastructure being leveraged for illegal exercise in opposition to exterior third events, probably leading to authorized repercussions and extreme operational disruptions. Swift detection and remediation are important to uphold belief and forestall such outcomes.

Decision and Key Takeaways: Implementing Coverage and the Worth of Swift Motion

The investigation confirmed unauthorized scanning originating by a scholar. Following this, the offender was rapidly recognized and made to stop the exercise. The incident was closed, with continued monitoring of the coaching room.

  • The Criticality of Early Detection: This case exemplifies the worth of detecting adversarial exercise on the Reconnaissance part (TA0043) through methods like Energetic Scanning (T1595). By figuring out and addressing this habits early, we prevented potential escalation to extra damaging techniques in opposition to an exterior goal.
  • Built-in Tooling: The seamless integration of Cisco XDR, Cisco Umbrella, Cisco FMC, Splunk ES, Slack API integration, Endace Imaginative and prescient and Palo Alto Cortex XSIAM enabled speedy detection, detailed evaluation, and exact attribution.
  • Vigilance in Coaching Environments: Even in managed, academic settings like Black Hat, steady monitoring and swift response are paramount. The dynamic nature of such environments necessitates sturdy safety controls to stop misuse and keep community integrity.
  • Coverage Enforcement: Clear communication and constant enforcement of community utilization insurance policies are important to handle expectations and forestall unauthorized actions, whether or not intentional or experimental.

About Black Hat

Black Hat is the cybersecurity trade’s most established and in-depth safety occasion collection. Based in 1997, these annual, multi-day occasions present attendees with the most recent in cybersecurity analysis, growth, and traits. Pushed by the wants of the neighborhood, Black Hat occasions showcase content material straight from the neighborhood by way of Briefings displays, Trainings programs, Summits, and extra. Because the occasion collection the place all profession ranges and tutorial disciplines convene to collaborate, community, and focus on the cybersecurity subjects that matter most to them, attendees can discover Black Hat occasions in the USA, Canada, Europe, Center East and Africa, and Asia. For extra info, please go to the Black Hat web site.


We’d love to listen to what you suppose! Ask a query and keep related with Cisco Safety on social media.

Cisco Safety Social Media

LinkedIn
Fb
Instagram
X

Share:





Supply hyperlink

Attendee Black Hat Cisco Breach Protection Cisco Secure Access Cisco Security Cloud Cisco Talos Cisco User Protection Cisco XDR con Def Network Operations Center NOC Scanning Security Operations Center SOC Splunk Splunk Cloud ThousandEyes Training..
admin
Redlighttips
  • Website

Related Posts

CMS to Check ‘Final result-Aligned Funds’ for Tech-Supported Ca…

December 6, 2025

Slaying The Dragon – The Well being Care Weblog

December 5, 2025

What Your Accent Says About You

December 3, 2025

Securing Brokers & AI Provide Chain with Cisco AI Protection

December 2, 2025

For Merck, AI Places People Within the “Proper Room”

December 1, 2025

UHS Seems to be to ‘Step-In’ Behavioral Push as Key Quantity Progress …

November 30, 2025
Don't Miss
Health

Accomplice Enablement: Key to Accomplice Success

December 7, 2025

Cisco is dedicated to creating coaching and enablement a aggressive differentiator for companions. What makes…

Fig Salad • Contemporary Fig Salad with Blue Cheese & Candied Walnu…

December 6, 2025

Hidden Hyperlinks Between Jobs & Well being

December 6, 2025

CMS to Check ‘Final result-Aligned Funds’ for Tech-Supported Ca…

December 6, 2025
Stay In Touch
  • Facebook
  • Twitter
  • Pinterest
  • Instagram
  • YouTube
  • Vimeo
Untitled design (11)
About Us

Welcome to Red Light Tips, your trusted source for health and wellness insights with a focus on red light therapy. We believe in empowering individuals to take charge of their well-being by offering comprehensive information about the benefits of red light therapy and its potential to enhance physical and mental health.

Quicklinks
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms and Conditions
Useful links
  • Detox
  • Health
  • Nutrition
  • Light Therapy
  • Healthcare
  • Donate NOW
Ssl
Facebook X (Twitter) Instagram Pinterest
Copyright 2024 redlighttipsandreviews

Type above and press Enter to search. Press Esc to cancel.