Events

ElevenPaths Talks Code for Devs

 

'LiLaS', a Project to Protect Data Networks by Santiago Hernández

August 22, 2018. In this Code Talks for Devs, Santiago will talk about a tool called LiLaS. It allow us to select the traffic that goes through our network at protocol level using Latch. Connect to the talk!


#CodeTalks4Devs: 'LiLaS', a Project to Protect Data Networks by Santiago Hernández

Code Talks for Devs webinar cybersecurity Latch Integration in a Cryptocurrency Wallet Using Exfiltration
Latch Integration in a Cryptocurrency Wallet Using Exfiltration Danilo Ninabanda, Ignacio Jiménez... March 21, 2018.
Code Talks for Devs webinar cybersecurity UAC-A-Mola, a Framework for Research, Detect and Mitigate UAC Bypasses
UAC-A-Mola, a Framework for Research, Detect and Mitigate... Pablo González y Santiago Hernández June 20, 2018.
Code Talks for Devs webinar cybersecurity Evil Foca in a nutshell
Evil Foca in a nutshell, get to know it! Álvaro Núñez-Romero July 18, 2018.
Code Talks for Devs webinar cybersecurity LiLaS, a Project to Protect Data Networks
LiLaS, a Project to Protect Data Networks Santiago Hernández August 22, 2018.
Code Talks for Devs webinar cybersecurity WordPress in Paranoid Mode
WordPress in Paranoid Mode Pablo González September 19, 2018.
Code Talks for Devs webinar cybersecurity How to Create a FOCA Plugin
How to Create a FOCA Plugin José Sperk October 17, 2018.
Code Talks for Devs webinar cybersecurity Joomla in Paranoid Mode
Joomla in Paranoid Mode Mateo González November 21, 2018.

We will also discover how we can use the Latch webhooks to provide a mechanism of auto-initialization where a device is listening over a network and it inserts each one of the protocols that moves around it for regulate them automatically.

Furthermore, we will explain all the technologies that make the network packets sniffing possible in real time, as well as the ability to block specific network protocols through removing all the packets that make it up. Finally, we will show some more advanced techniques of network automatic regulation using compromise indicators. With this technique, the tool is able to determine potentially dangerous states by itself and to block specific network protocols.

Find out more about this subject:
Latch web