Mohamed Bedewi
Senior Security Researcher and Penetration Tester (UAE)
BIOGRAPHY
Senior Security Researcher and Penetration Tester at DTS Solution with more than 13 years of technical experience, he has worked with sensitive governmental entities, banks, colleges, major telecommunication providers, power and energy providers, transportation authorities, his main area of interest is web application security, SCADA/ICS penetration testing, application exploitation, social engineering and physical security. Expert in almost every operating system, deep and detailed understanding of all 7 OSI Layers, Unix and Linux user with years of in depth technical experience, malicious coder, exploitation ninja and capable of turning a very simple vulnerability into a nightmare, stealthy by default and even if you have the latest security mechanisms in place, you’ll always find him lurking around looking for new vulnerabilities and exploits!
Twitter: https://twitter.com/mbedewi
LinkedIn: https://ae.linkedin.com/in/mbedewi
Building a Weaponized Honeybot
Honeybots are a sophisticated security control which can be used as a stress reliever in case of persistent targeted attacks, to analyze and understand attack patterns to implement proper security controls and sometimes it can be used to put cyber-criminals behind bars.
Honeybots are not widely used because their deployment can be complex and time-consuming also their coverage for web applications is very limited and not sufficient specially when most of the online attacks are targeting web applications and services.
In this presentation I will discuss the process of building a fully weaponized honeybot which can function on both application and network levels, I will also highlight with a live demonstration how it can effectively and robustly decoy, deanonymize, identify, attack and profile malicious users even if they’re behind TOR, VPN or Proxies automatically with zero human interaction.
Are you the next cyber security superstar?
If you are passionate about an information security topic or you have strong technical skills developing researches on your own, you should definitely Apply at Call for Papers. By submitting you will have the chance to showcase your work to +2000 attendees.
Other speakers joining this year
Razvan-Costin IONESCU
Security QA Engineer Intel (RO)
Gustavo Grieco
Phd. student CIFASIS (AR)
Cosmin Anghel
Incident Manager UTI-CERT
Ready for this year's presentations?
By registering you will unlock access to 60+ speakers and two full days with cyber security news & showcases from worldwide leaders.
COMPETITIONS
Sponsors & Partners
They help us make this conference possible.
POWERED BY
Orange Romania is part of the Orange Group, one of the largest global telecommunications operators that connects hundreds of millions of customers worldwide. With over 11 million local customers and an annual turnover exceeding 1.5 billion euros, Orange Romania connects 1 in 2 Romanians and offers an extensive range of communication solutions for both individual and corporate customers, from basic connectivity services to complete mobile, fixed internet, TV packages, and complex IT&C solutions through Orange Business.
Orange Romania is the number 1 operator in terms of network performance, and also holds nine consecutive Top Employer certifications, which confirm that Orange Romania, in addition to the remarkable products and services it offers, pays special attention to its employees and working environment. In the past 3 years Orange has launched two 5G Labs in Bucharest and Iasi, that aim to support researchers, startups and companies to test their 5G solutions in advance.
In addition, Orange is a long-term supporter of the startup ecosystem through the Orange Fab accelerator program designed to support entrepreneurs in the development of innovative products and their distribution locally and internationally.