Netconf 2020 edition

Netconf 2020 edition

An unconference on the technical, economic and social aspects of network engineering and infrastructure

Make a submission

Submissions are closed for this project

TERI auditorium, Bangalore, Bangalore

This event is postponed. Watch this page for updates.

Netconf has emerged from conversations that started at Rootconf 2019 edition and continued into Rootconf Pune, Hyderabad and Delhi editions subsequently.

Netconf is a platform for network engineers, ISPs, government representatives from telecom and IT departments, civil society groups, policy makers, providers of networking solutions, tech and law groups and activists, among others to discuss the technical, economic and social aspects of running networks and infrastructure, and access. See https://hasgeek.com/rootconf/netconf-2020/proposals#call-for-proposal for more details about topics.

The first edition of Netconf is an unconference, where participants can propose topics, suggest speakers and session formats. The event’s agenda will be set by participants. There will be room for open sessions for participants to propose topics/ideas/sessions on the morning of the event itself.

Event details:
Date: Friday, 27 March 2020
Venue: TERI auditorium, Domlur, Bangalore
Time: 9 AM to 6:30 PM followed
Schedule: https://hasgeek.com/rootconf/netconf-2020/schedule
Post-conference programme: reading of Michael W. Lucas’s works on tech-fiction followed by dinner.


For inquiries about tickets and sponsorships, write to sales@hasgeek.com or call 7676332020.

Click here for the sponsorship deck


To speak at Netconf, submit a talk here: https://hasgeek.com/rootconf/netconf-2020/proposals#call-for-proposal


Entry for children at Netconf: Children of all ages are welcome at Netconf. Entry for children is free. If you are bringing child/children under age 1, mention it when filling your ticket details. This will help us to arrange facilities for care.
Participants are welcome to propose sessions and activities for engaging children at Netconf.


Community Sponsor

FreeBSD

Hosted by

Rootconf is a forum for discussions about DevOps, infrastructure management, IT operations, systems engineering, SRE and security (from infrastructure defence perspective). more

Shyam Ramaswami

@shyamramaswami

Port 53: The abused land of DNS tunneling by malware pirates

Submitted Mar 9, 2020

Malwares are common,complex and so are malware authors. The vast world of internet’s policy of knowledge sharing and product trials have given researchers and malware authors equal rights when it comes to resource access. This is led to trail of malwares over security products and even abusing some of the key network features like DNS tunneling. The talk deals about how modern day malwares operate, how they evade the latest security products and how they exiltrate the stolen data via legit DNS tunneling channels.

Outline

Malwares are common,complex and so are malware authors. The vast world of internet’s policy of knowledge sharing and product trials have given researchers and malware authors equal rights when it comes to resource access. This is led to trail of malwares over security products and even abusing some of the key network features like DNS tunneling. Here is what the talk would be covering :

  1. What are malwares and how do they end up in a system
  2. How researchers try to study a malware using a sandbox
  3. Modern day malwares that evade sandboxes
  4. How do malware authors exfiltrate data
  5. The new age exfiltration via port 53
  6. What is 53 and what is dns tunneling
  7. How malware pirates abuse dns tunneling
  8. Command and control channel, what is it ?
  9. How does DNS tunneling queries looks like during exfiltration ?
  10. How command and control works over dns tunneling ?
  11. Patterns that can be spotted during dns tunneling
  12. How can Machine learning aid in builing an anamoly pattern for dns tunneling ?
  13. Thank you !

Requirements

Participants !

Speaker bio

Shyam Sundar Ramaswami is a TEDx speaker, Black Hat speaker, GREM certified malware analyst, Cisco Security Ninja black belt and teaches cyber security using “Batman” & ” Avengers” characters.Shyam heads the Threat research group for Asia Pacific and is a lead threat researcher in Cisco.
Shyam has delivered talks in several conferences and universities like Black Hat (Las Vegas), Stanford University (Cyber Security Program), Qubit Forensics (Serbia), NullCon Goa 2020, Cisco Live (Barcelona), IRespond (San Francisco), Defcon Packet Village (remote) and in several IEEE forums in India.
Shyam also teaches cyber security ” Advanced malware attack and defences” in Stanford Cyber security program and runs a mentoring program called being robin where he mentors students all over the globe on cyber security.

Links

Comments

{{ gettext('Login to leave a comment') }}

{{ gettext('Post a comment…') }}
{{ gettext('New comment') }}
{{ formTitle }}

{{ errorMsg }}

{{ gettext('No comments posted yet') }}

Swaminathan S

Eye on Infrastructure

Abstract: In this talk, I would be sharing my point of views on Network monitoring. more

10 Mar 2020