By Sherri Davidoff   /   Jul 9th, 2013

Network Forensics Black Hat and DEFCON - JOIN US! | LMG Security

Want to tear apart Android cell phone dumps and Blackhole Exploit Kit 2 infection traffic? LMG has been hard at work gearing up for network forensics Black Hat and DEFCON. We’ve developed brand new puzzles for you to play with, a shiny new Network Forensics virtual workstation, and lots more. Here’s a quick preview:


  • Register for “Network Forensics: Black Hat Release” (4-Day course). Learn the ins and outs of packet analysis, flow record analysis, wireless forensics, intrusion detection and analysis, covert tunneling, malware network behavior– all packed into a dense 4 days with intensive hands-on technical labs.
  • Cellular network forensics is here! Don’t miss our cutting edge workshop, “Do-It-Yourself Cellular IDS,” during the Black Hat Briefings.
  • LMG is releasing a brand-new Network Forensics Workstation exclusively for students of “Network Forensics: Black Hat Release.” It includes all of the tools you need to solve every case study in the class, plus extra goodies. You can install this customized ISO to a virtual machine, or right on a hard drive.
  • We’ve got another AWESOME puzzle contest lined up for DEFCON, which will be publicly released online at the Network Forensics Puzzle Contest web site afterwards. Keep your eyes peeled for all the new packet captures!

See you in Vegas!

About the Author

Sherri Davidoff

Sherri Davidoff is the CEO of LMG Security and the author of “Data Breaches: Crisis and Opportunity.” As a recognized expert in cybersecurity, she has been called a “security badass” by the New York Times. Sherri is a regular instructor at the renowned Black Hat trainings and a faculty member at the Pacific Coast Banking School. She is also the co-author of Network Forensics: Tracking Hackers Through Cyberspace (Prentice Hall, 2012), and has been featured as the protagonist in the book, Breaking and Entering: The Extraordinary Story of a Hacker Called “Alien.” Sherri is a GIAC-certified forensic examiner (GCFA) and penetration tester (GPEN) and received her degree in Computer Science and Electrical Engineering from MIT.  Her latest book, “Ransomware and Cyber Extortion,” will be published this year.