Presented at
DerbyCon 1.0 (2011),
Oct. 2, 2011, 11 a.m.
(50 minutes).
1: Collect Packets, 2: ???, 3: Win! These demos and presentation will help you learn to passively profile a network through a new Metasploit module by gathering broadcast and multicast traffic, processing it, and looking at how the bad guys will use it to own your network. Without sending a packet, many networks divulge significant information about the assets that are attached. These broadcast packets can be used to identify hosts, OS’s, and other hardware that is attached. This presentation will show all skill levels how to easily gather and use this information, how to protect your underpants, and talk about how to extend the framework for new protocols.
Presenters:
-
Ryan Linn (sussurro)
Ryan Linn is an Information Security Engineer who has a passion for making security knowledge accessible. With over 10 years in IT and Security Ryan has experience in both the education and corporate IT and security arenas and has experience dealing with the security challenges inherent to different environments. In addition to being a columnist with the Ethical Hacker Network, Ryan has contributed to open source tools including Metasploit and the Browser Exploitation Framework (BeEF) and has has the opportunity to present research at conferences such as Defcon, SecTor and BSides events.
Similar Presentations: