Igor Senushin, Product/Project manager, Head of R'n'D at TSARKA.
Topic of Guest Lecture: "Development of protected devices".In this workshop, participants will dive into the world of cybersecurity and learn how to leverage the innovative capabilities of the tLab Anti-APT platform to detect and block file-based attacks on the email perimeter. The focus will be on developing custom Yara and Sigma rules that account for the attack context, minimize false positives, and ensure robust protection.
A unique feature of the tLab Yara module is its ability to incorporate additional attribute-based data, including attack vectors (sender/recipient) and indicators from the tLab sandbox static engines, significantly improving detection accuracy. Additionally, participants will learn how to use the integrated SigmaHQ engine to identify complex attack scenarios
This seminar provides participants with hands-on experience in compromising corporate networks and demonstrates the full attack cycle on an Active Directory infrastructure. During the session, attendees will explore initial access techniques from an external network, pivoting methods, internal infrastructure reconnaissance (enumeration), and privilege escalation to the level of a domain administrator.
Special emphasis is placed on using specialized tools, including:
- BloodHound – Analysis of trust relationships within the domain
- Netexec – Automated exploitation of vulnerabilities
- Impacket scripts – Authentication attack execution
- Kerbrute – Kerberos credential brute-forcing
- OpenSSH + ProxyChains – Pivoting into the internal network
Initial Access: Exploiting RCE via Out-of-Band methods, obtaining a reverse shell
TSARKA Group Workshop
During this workshop, participants will learn key techniques and tools for rapid cyber incident response. They will acquire skills in extracting critical indicators of compromise from the memory of attacked systems, applying the QuickScan approach, and effectively investigating modern attacks.
TSARKA labs Workshop
Participants will learn the principles of developing secure electronic devices, including hardware and software protection methods against hacking and reverse engineering. We will cover key aspects of microcontroller protection and the use of cryptographic modules.
We will briefly go through all stages of development to understand where and what to pay attention to.
Palo Alto Networks Workshop
Today’s zero-day attacks are sophisticated and persistent. Palo Alto Networks changed the game by making network security intelligent and proactive. See firsthand the impact of hardware and software firewalls powered by Precision AI™.
The NGFW workshop gives prospects the opportunity to learn firsthand the impact of hardware and software firewalls powered by Precision AI®. Get insights on security policies that quickly restore visibility and control over applications, users, and content after a cyber intrusion.
ICCSDFAI-25 Team
In this activity, you will:
• Log in to the Ultimate Test Drive Workshop from your laptop
• Understand the layout of the environment and its various components
• Enable the Firewall to facilitate connectivity