Network Operations Center Report
This presentation provides an overview of the security infrastructure and monitoring capabilities deployed at the Black Hat conference Network Operations Center (NOC). It details the integration of various security vendors and tools, including network detection and response (NDR), next-generation firewalls, and identity management systems, to monitor and protect the conference network. The talk highlights the collaborative effort between security partners to achieve visibility into network traffic and detect potential threats in real-time. The session serves as a high-level architectural review of the NOC's security stack rather than a deep-dive technical exploit demonstration.
Behind the Scenes of the Black Hat 2025 Network Operations Center
TLDR: The Black Hat 2025 Network Operations Center (NOC) provides a masterclass in high-visibility network monitoring, utilizing a stack of NDR, NGFW, and identity management tools to secure a massive, transient environment. By integrating Zeek for protocol analysis, Suricata for signature-based detection, and Cortex XSIAM for centralized orchestration, the team achieves real-time threat hunting capabilities. Pentesters and researchers should study this architecture to understand how modern SOCs correlate disparate telemetry to identify malicious traffic patterns in complex, segmented networks.
Security conferences are essentially massive, high-stakes capture-the-flag environments where the participants are both the researchers and the potential targets. Protecting the network at an event like Black Hat requires more than just a perimeter firewall; it demands a sophisticated, multi-layered approach to visibility and response. The NOC team at Black Hat 2025 recently shared their architectural strategy, revealing how they manage a transient, high-traffic environment that serves thousands of security-conscious attendees.
The Architecture of Visibility
At the core of the NOC’s strategy is the principle that you cannot defend what you cannot see. The infrastructure relies on a robust tap-and-aggregate model. Traffic is captured from the network and fed into a series of sensors that perform deep packet inspection and protocol analysis. By leveraging Arista switching infrastructure, the team ensures that traffic is mirrored and distributed to the security stack without introducing latency or bottlenecks.
The primary sensor layer utilizes Zeek for metadata generation and Suricata for signature-based intrusion detection. This combination is standard for a reason. Zeek provides the "who, what, and where" of network connections, while Suricata flags known bad patterns. The NOC team takes this a step further by integrating Corelight to manage these sensors, which allows them to turn raw traffic into structured logs that are easily ingested by their SIEM and XDR platforms.
Orchestration and Threat Hunting
Data ingestion is only half the battle. The real challenge is turning that telemetry into actionable intelligence. The NOC uses Cortex XSIAM as a centralized platform to ingest logs from firewalls, identity providers, and NDR sensors. This allows the team to perform cross-platform correlation. For example, if a device exhibits anomalous behavior, the team can quickly pivot from the network alert to the identity logs provided by Cisco ISE to identify the user and the specific device involved.
For researchers and bug bounty hunters, the most interesting aspect of this setup is the "threat hunting" loop. The team doesn't just wait for alerts; they actively query their data to find "needles in the needle stack." They look for T1071-style communication patterns, where attackers use common application-layer protocols to hide command-and-control traffic. By monitoring for unusual beaconing or data exfiltration, they can identify compromised hosts even when the traffic appears benign at the packet level.
Real-World Application for Pentesters
When you are on an engagement, you rarely have the luxury of a perfectly tuned SOC watching your every move. However, understanding how these systems work is critical for evasion. If you are testing a client's network, you should assume that their NDR solution is logging every connection attempt. If you are using tools that rely on standard protocols, you are likely being indexed by a Zeek-like sensor.
Consider the impact of T1040-network-sniffing. If you are performing internal reconnaissance, you are generating traffic that is easily detectable by an NDR platform. The NOC team’s approach demonstrates that even encrypted channels, which might bypass simple signature-based detection, are often flagged by behavioral analysis. If you are using T1573-encrypted-channel to establish a C2, the metadata generated by the handshake—such as JA3 fingerprints—is often enough to trigger an alert in a well-configured environment.
Defensive Lessons from the NOC
Defenders should focus on the integration of identity and network telemetry. The NOC’s ability to map a network flow to a specific user identity is the single most effective way to reduce mean time to respond (MTTR). If you are building a security stack, prioritize platforms that can ingest and correlate logs from your identity provider, your firewall, and your NDR sensors. Without this correlation, you are left with a flood of alerts that lack the context necessary for effective triage.
The NOC team’s work highlights that the most effective security is not about buying the most expensive tool, but about ensuring that your tools talk to each other. Whether you are a pentester looking to understand the detection landscape or a defender trying to build a more resilient network, the key is visibility. Start by auditing your own telemetry. Are you logging enough metadata to reconstruct a session, or are you just looking for signatures? The difference between a successful breach and a caught attacker often comes down to the quality of the logs you collect before the incident even begins.
Tools Used
All Tags
Up Next From This Conference
Similar Talks

Unmasking the Snitch Puck: The Creepy IoT Surveillance Tech in the School Bathroom

Anyone Can Hack IoT: A Beginner's Guide to Hacking Your First IoT Device




