Dirty Little Secrets Part 2

Presented at DerbyCon 2.0 Reunion (2012), Sept. 28, 2012, 7 p.m. (50 minutes)

This talk (hopefully) provides some new pentesters tools and tricks. Basically a continuation of last year’s Dirty Little Secrets they didn’t teach you in Pentest class. Topics include; OSINT and APIs, certificate stealing, F**king with Incident Response Teams, 10 ways to psexec, and more. Yes, mostly using metasploit.


Presenters:

  • Rob Fuller / mubix as Rob Fuller (Mubix)
    Mubix is a Senior Red Team member for a Fortune 500. He is a cast member of the video podcast Hak.5 and is very active in the open source community as a thought provoker, reviewer and sometimes even a coder. He has worked on projects like Metasploit, Jasager, and the Hak5 USB Rubber Ducky. His professional experience start from his time on active duty as United States Marine. He has worked with devices and software that run gambit in the security realm. He has the Security+, C|EH, and Offensive Security Certified Professional certifications. But the titles that he holds above the rest is FATHER, HUSBAND and United States Marine
  • Chris Gates / carnal0wnage as Chris Gates (Carnal0wnage)
    Chris joined LARES in 2011 as a Partner & Principal Security Consultant. Chris has extensive experience in network and web application penetration testing as well as other Information Operations experience working as an operator for a DoD Red Team and other Full Scope penetration testing teams (regular pentesting teams too). Chris holds a BS in Computer Science and Geospatial Information Science from the United States Military Academy at West Point and holds his… redacted…no one cares anyway. In the past, he has spoken at the United States Military Academy, BlackHat, DefCon, Toorcon, Brucon, Troopers, SOURCE Boston, OWASP AppSec DC, ChicagoCon, NotaCon, and CSI. He is a regular blogger carnal0wnage.attackresearch.com and is also a regular contributor to the Metasploit and wXf Projects. http://twitter.com/carnal0wnage

Similar Presentations: