Mohamed Bedewi
Senior Security Researcher and Penetration Tester (UAE)
BIOGRAPHY
Senior Security Researcher and Penetration Tester at DTS Solution with more than 13 years of technical experience, he has worked with sensitive governmental entities, banks, colleges, major telecommunication providers, power and energy providers, transportation authorities, his main area of interest is web application security, SCADA/ICS penetration testing, application exploitation, social engineering and physical security. Expert in almost every operating system, deep and detailed understanding of all 7 OSI Layers, Unix and Linux user with years of in depth technical experience, malicious coder, exploitation ninja and capable of turning a very simple vulnerability into a nightmare, stealthy by default and even if you have the latest security mechanisms in place, you’ll always find him lurking around looking for new vulnerabilities and exploits!
Twitter: https://twitter.com/mbedewi
LinkedIn: https://ae.linkedin.com/in/mbedewi
Building a Weaponized Honeybot
Honeybots are a sophisticated security control which can be used as a stress reliever in case of persistent targeted attacks, to analyze and understand attack patterns to implement proper security controls and sometimes it can be used to put cyber-criminals behind bars.
Honeybots are not widely used because their deployment can be complex and time-consuming also their coverage for web applications is very limited and not sufficient specially when most of the online attacks are targeting web applications and services.
In this presentation I will discuss the process of building a fully weaponized honeybot which can function on both application and network levels, I will also highlight with a live demonstration how it can effectively and robustly decoy, deanonymize, identify, attack and profile malicious users even if they’re behind TOR, VPN or Proxies automatically with zero human interaction.
Are you the next cyber security superstar?
If you are passionate about an information security topic or you have strong technical skills developing researches on your own, you should definitely Apply at Call for Papers. By submitting you will have the chance to showcase your work to +2000 attendees.
Other speakers joining this year
Alexandru Balan
Chief Security Researcher Bitdefender
Costel Maxim
Security QA Lead Intel's Open Source Technology Center (RO)
Yury Chemerkin
Security Expert (RU)
Ready for this year's presentations?
By registering you will unlock access to 60+ speakers and two full days with cyber security news & showcases from worldwide leaders.
COMPETITIONS
Sponsors & Partners
They help us make this conference possible.
POWERED BY
Orange Business is a key division of Orange Romania, specializing in providing cutting-edge communication, technology, and digital transformation solutions tailored to businesses of all sizes. With a strong emphasis on innovation, Orange Business offers a wide array of services, including high-speed connectivity, cloud computing, cybersecurity, Internet of Things (IoT), and managed services. Their mission is to support organizations in their digital transformation journey by enhancing operational efficiency, improving customer experience, and maintaining a competitive edge in a rapidly changing digital environment.
Orange Business combines deep technological expertise with a customer-centric approach, ensuring that each solution is customized to meet the specific needs of their clients. Their commitment to innovation and excellence makes them a trusted partner for businesses seeking to thrive in the digital age.