Dozens of Black Hat attendees came to the booth to match wits with the #F5CipherChallenge.
To unlock the cipher this year, they needed to solve a crossword puzzle, then navigate a branching decision tree to get the key. Congrats to the winners, and thanks to everyone who participated!
DID YOU TEST YOUR CIPHER SKILLs?
Every year at Black Hat, we debut a new t-shirt design, some of which contain a hidden message. This year, an innovative branching illustration provided a vital clue in the #F5CipherChallenge.
THE 2019 T-SHIRT
GET THE LATEST INTEL ON THE APP THREATS THAT MATTER
Learn how to protect your apps from today’s critical threats with these short talks from F5 security experts at Black Hat.
fight the good fight against THE bad bots
Are you blind to encrypted threats?
Understanding the Application Threat Surface
COULDN'T MAKE IT TO black hat CONFERENCE 2019?
Learn more about securing your apps against today’s most critical threats.
Watch our top application
security webinars >
Read our application protection eBook series >
follow @f5security >
protect your apps with f5 >
Learn how bots infect, propagate, and attack applications; what types of application attacks are commonly performed by bots; and how to defend against bad bots without disrupting the good ones.
f5 labs 2019 APPLICATION PROTECTION series
F5 Labs threat intelligence focuses on applications because your adversaries focus on applications.
Watch the video
Are your apps secure against today's most critical threats?
F5 at BLACK HAT conference 2019
The majority of malware and data exfiltration hides within encryption, blinding your security inspection tools. Learn how to decrypt and orchestrate your traffic to make your controls more effective.
BLACK HAT CONFERENCE 2019
Go to F5 Labs
< BACK TO EVENTS
CONNECT WITH F5
F5 LABS
DEV CENTRAL
F5 NEWSROOM
The latest in application threat intelligence.
Go to Dev Central
The F5 community for discussion forums and expert articles.
News, blogs, and more.
Go to the newsroom
YOUR APPS—FAST, AVAILABLE, AND SECURE—IN ANY CLOUD.
With 20+ years of application service experience, F5 provides the broadest set of services and security for enterprise-grade apps, whether on-premises or across any multi-cloud environment.
HAVE A QUESTION? |
Support and Sales >
FOLLOW US
Read the Research Series
Watch the video >
Watch the video >
Watch the video >
The F5 Labs team delves into public breach reports to understand the most prevalent attack types in 2018. Learn about the root causes and tactics that bad actors are using to attack your organization's most critical applications.
2019
Imagine you could browse a target's internal network without deploying anything on the victim’s machine: a one-click setup that provides you a magic tunnel from the outside world. That's the idea behind "ReD Tunnel". The design goal was to use tools (such as the web browser) that already exist on the victim's device. To create this new capability, we combined JavaScript reconnaissance techniques and the DNS rebinding attack. Just open your browser, wait until the victim visits your website, and start browsing the websites within their network.
ReDTunnel: Explore Internal Networks via DNS Rebinding Tunnel
ARSENAL
SPEAKER
Principal Security Researcher
F5
TOMER ZAIT
In June 2018 ProtonMail suffered rapidly morphing sustained DDOS attacks. By creating a toolkit that mimics the ProtonMail attacks, F5 researchers discovered through analysis that the most effective defense against such attacks is a combination of an unsupervised machine learning algorithm to determine a baseline, performing anomaly detection and mitigation, and using another machine learning algorithm to tune the performance of the first. An SOC operator did not have to react at machine speed, but simply monitored the findings and the actions of the machine.
Defense Against Rapidly Morphing DDoS
BRIEFING
Product Management Engineer, Security
F5
MIKHAIL FEDOROV
Architect, Security Products
F5
Mudit Tyagi
SPEAKERS
STRENGTHEN YOUR APP SECURITY STRATEGY
See the presentation >
See the presentation >