Presented at
DEF CON 17 (2009),
Aug. 2, 2009, 10 a.m.
(50 minutes).
In this talk I'll cover the research efforts done when we managed to come across a criminally operated server running the latest Neosploit (and other goodies).
During the research there have been several crucial points of interest such as the discovery of compromised credentials, getting into the applications used by the criminals to manage the infections, and the infection channels, as well as a few hairy moments of being logged in to the server while "someone" else was also logged in (from a notorious location that has been brought down after an article at the Washington Post - McColo...).
Presenters:
-
Iftach Ian Amit
- Director, Security Research, Aladdin
With more than 10 years of experience in the information security industry, Ian (Iftach) Amit brings a mixture of software development, OS, network and Web security expertise as a Managing Partner of the top-tier security consulting and research firm Security-Art. Prior to Security-Art, Ian was the Director of Security Research for the Content Security Business Unit at Aladdin Knowledge Systems, where he created the AIRC (Attack Intelligence Research Center). Prior to joining Aladdin, Amit was Director of Security Research at a global Internet security company, leading its security research while positioning it as a leader in the Web security market. Amit has also held leadership roles as founder and CTO of a security startup in the IDS/IPS arena, developing new techniques for attack interception, and director at Datavantage responsible for software development and information security, as well as designing and building a financial datacenter. Prior to Datavantage, he managed the Internet application and UNIX worldwide. Amit holds a Bachelor's degree in Computer Science and Business Administration from the Interdisciplinary Center at Herzlya.
Links:
Similar Presentations: