Alice in Exploit Redirection-land – A trip down the rabbit hole

Presented at DerbyCon 2.0 Reunion (2012), Sept. 30, 2012, 1 p.m. (30 minutes).

Learn to understand the sweet complexity that is redirection. Keep yourself anonymous and out of your target’s logs. In this lecture we will cover the topic of redirection and how to use it to send our (exploit) packets through to our end target.


Presenters:

  • Nathan Magniez
    Nathan Magniez came on board with AoE in the spring of 2009 as a senior cyber instructor. Since his arrival, Nathan has focused his attention on the evolution of the Art of Exploitation™ training suite and instruction of those courses. Nathan started his career with a five-year enlistment in the United States Marines Corps. Originally trained as a Russian Cryptologic Linguist, he realized that his greatest potential and aptitude fell within Digital Network Exploitation (DNE). During his time in the Marine Corps, he served on tactical teams that focused on the collection and exploitation of wired and wireless networks. Nathan also served as an operator on the National Security Agency’s Red Team, which sought to directly improve the security standpoint of our nation’s key networks. Prior to joining the TCS Cyber Intelligence Group, he worked at Qualys, Inc. on their team of Vulnerability Research and Detection engineers. Nathan worked as an Incident Responder and Special Investigator on the National Incident Response Team (NIRT) at the Federal Reserve Bank of New York and San Francisco in support of the United States Treasury. In addition to this role, Nathan also focused on Vulnerability Assessments and Penetration Testing. Nathan has also started a fundraiser to raise money for Hackers for Charity’s Food for Work program in East Africa. Please visit www.HackHunger.com for more information.

Similar Presentations: