Follow the White Rabbit, Neo! With all of those text-based interfaces, we all know that the Matrix hackers were all running Linux.
In this Matrix-themed episode in Jay Beale's Linux attack and defense webinar series, watch the CTO of InGuardians break into a Matrix-themed VM, escalating privilege and capturing flags as he goes. Then he'll switch to the Agents' side, demonstrating how you can use Linux defensive techniques to proactively break the humans' attacks.
From this session, attendees will:
- Learn how to attack a capture the flag Linux machine with Kali Linux
- Understand how to configure Linux to break attacks
Jay Beale has created several defensive security tools, including Bastille Linux/UNIX and the CIS Linux Scoring Tool, both of which were used widely throughout industry and government. He has served as an invited speaker at many industry and government conferences, a columnist for Information Security Magazine, SecurityPortal and SecurityFocus, and a contributor to nine books, including those in his Open Source Security Series and the “Stealing the Network” series. He has led training classes on Linux Hardening and other topics at Black Hat, CanSecWest, RSA, and IDG conferences, as well as in private corporate training. Jay is a co-founder, Chief Operating Officer and CTO of the information security consulting company InGuardians.