Becoming Mallory – How to Win Creds and Influence Devices

Presented at DerbyCon 2.0 Reunion (2012), Sept. 30, 2012, 1 p.m. (50 minutes)

Imagine an attack that is effective at 99% of organizations throughout the world. Now imagine that attack will yield you credentials and information that could allow you to completely take over and/or shut down an organization. Now imagine there are no solid defenses for such an attack and it goes largely unnoticed. Sounds like something off the fiction shelves, but it’s not. By leveraging one or multiple Man in the Middle attacks, a malicious person could very easily gain the “keys of the kingdom” in almost all organizations worldwide. With that power they can steal vital information, spread malware and even shut down the entire network of an organization.


Presenters:

  • Eric Milam
    Eric Milam is a senior security consultant with Accuvant LABS’s Enterprise Security practice and has over 14 years of experience in information technology. Eric performs ongoing enterprise security assessments, perimeter penetration testing, and application vulnerability assessments. Eric has performed innumerable consultative engagements including enterprise security and risk assessments, perimeter penetration testing, vulnerability assessments, social engineering, physical security testing and has extensive experience in PCI compliance controls and assessments.

Similar Presentations: