Loading…
This event has ended. Visit the official site or create your own event on Sched.
It is an annual, community-driven information security conference held in Prague. The event provides a platform for cybersecurity professionals, enthusiasts, and researchers to share knowledge, exchange ideas, and discuss the latest trends in the field. It’s a unique opportunity to connect with like-minded individuals, expand professional networks, and stay informed about the ever-evolving cybersecurity landscape.
More info at www.bsidesprg.cz

Tuesday April 21, 2026 09:00 - 12:00 CEST
Are you tired of JupyterLab notebooks with single-threaded, unoptimized, PoC code that does not scale in real-world scenarios? Do you have a C2 beaconing problem on your network? Well, look no further! This workshop can fit so much data science for C2 detection! *slaps roof of a pile of code*

If you always wanted to know how tools like Flare or RITA work, how to do C2 detection with frequency analysis, or how to use probability theory to spot beaconing traffic, then this is the workshop for you!We are going to be obsessing over the nitty-gritty details of spotting beaconing traffic using data science methods. However, this time, we will not use JupyterLab notebooks! We want to show you how to do these detections in real network environments, and at scale. We will use solutions that can ingest network data and then provide meaningful outputs in a reasonable amount of time. The main goal of this workshop is to give you the understanding you need to apply these techniques the next day at work.

You can just attend this workshop and get your hands dirty with bits and bytes, but if you want to have a better understanding of the underlying theories, concepts, and technical considerations, then you should also come to our talk! Yes, we are sort of cheating here, hoping that you will attend both! :P So, are you coming to the talk?


Requirements for the workshop:
  • A laptop with at least 16 GB of RAM and more than 50 GB of free disk space (VT-x support must be enabled on the host system).
  • Application to run Virtual Images (type-2 hypervisor): VMWare Workstation Pro (recommended), VMWare Workstation Player, VMWare Fusion, or VirtualBox.
  • Only 64-bit Intel-compatible (Intel or AMD) processors are supported.

WARNING: ARM-based devices (such as Apple Silicon, Qualcomm Snapdragon, and some Microsoft Surface laptops) cannot perform the necessary virtualization and therefore cannot be used for the workshop.


Speakers
avatar for Eva Szilagyi

Eva Szilagyi

Consultant, Alzette Information Security


avatar for David Szili

David Szili

Principal consultant, Alzette Information Security
David Szili is a principal consultant at Alzette Information Security, an information security consulting company based in Europe. He has more than ten years of professional experience in various areas like penetration testing, red teaming, security monitoring, security architecture... Read More →
Tuesday April 21, 2026 09:00 - 12:00 CEST
Novotel - WR1 Kateřinská 38, Nové Město, 120 00 Praha-Praha 2, Czechia

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

Share Modal

Share this link via

Or copy link