Attacker behavior analysis base on attack vector analysis
Analysis hacking technique to analyze the victim system hacked by the attacker, and analysis various artifact on the victim system to reconstruct the attacker’s behavior.
- Attack techniques and vector to hack to server system
- Types of artifact and log analysis techniques
- Analysis the types of artifact according to each attack technique
- Reconstruct attacker’s behavior base on evidences(Artifact)
Name: Park Moonbeom
I’m working in cyber security and incident response sector of South Korea as a general researcher and cyber investigation advisory member of the national investigation agency. Also I’m responsible for research on hacking methods, analyze hacking incident also, profiling the relationships. And I’m not only one of the leaders in Asia’s oldest underground hacker group, but also an instructor and mentor in the program(a.k.a BoB) to train ethical hackers in South Korea.