Joe DeMesy to Present at LABSCon 2022

Date:
September 23 at 1:35 PM
Location:
The Phoenician in Scottsdale, AZ
cybersecurity conference LABSCON white logo on purple background.

Join Bishop Fox Principal Joe DeMesy at LABSCon for a look at the open source offensive security tool, Sliver. LABSCon is dedicated to showcasing bleeding-edge research into cyber threat actors, malware hunting techniques, vulnerabilities, exploits, and tools from the best cybersecurity researchers on the planet. This year's conference will be taking place at The Phoenician in Scottsdale, a world-class resort. 

"Sliver Me Timbers"

Sliver is an open source adversary emulation/post-exploitation framework implemented in Golang and designed for red and blue teams.

This presentation will include stories of how our red team evades detection and inspire goals for blue teams to hunt for IOCs in creative ways. We will also go over the implementation details of Sliver’s HTTP and DNS C2 communications, and the challenges for attackers when implementing C2 over these protocols. We’ll also look at the various strategies employed by Sliver and other C2s to avoid network based detections.

We will also examine Sliver’s scripting interfaces and their utility to blue teams conducting automated endpoint control testing.


Joe demesy

About the speaker, Joe DeMesy

Principal

Joe DeMesy is a Principal at Bishop Fox. Joe is an expert in red teaming, secure development, proficient in several programming languages, and is a leading contributor to various open source projects. Joe is a noted expert in the field of information security, having been quoted in MarketWatch, NPR, InformationWeek, and Dark Reading. He has also presented his research at conferences such as BSidesLV, Kiwicon, BlackHat and private conferences hosted by the US Department of Defense.
More by Joe

Ready to get started? We can help.

Contact Us

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.