Dirty Red Team Tricks II

Presented at DerbyCon 2.0 Reunion (2012), Sept. 30, 2012, 10 a.m. (50 minutes)

Let’s again, time travel to 2003 with today’s tools and own everything. This talk takes you inside the red teams at the North East, Mid Atlantic, Pacific Rim, and National Collegiate Cyber Defense competition events. This talk is a revolution compared to last years Dirty Red Team Tricks. Each year, the students up their game and the red team does as well. You’ll learn how sophisticated bots allowed these red teams to persist deeply, automatically harvest plain-text credentials, and scale their efforts during these events. Once again, you’ll catch some niftier persistence tricks in UNIX and Windows. If you defend networks or play in these events, come and see what others are using on you. If you think you’ll find yourself on a red team, you need to come to this talk.


Presenters:

  • Raphael Mudge
    Raphael Mudge is the founder of Strategic Cyber LLC, a Washington, DC based company that creates software for red teams. He created Armitage for Metasploit, the Sleep programming language, and the IRC client jIRCii. Previously, Raphael worked as a security researcher for the US Air Force, a penetration tester, and he even invented a grammar checker that was sold to Automattic. His work has appeared in Hakin9, USENIX ;login:, Dr. Dobb’s Journal, on the cover of the Linux Journal, and the Fox sitcom Breaking In. Raphael regularly speaks on security topics and provides red team support to many cyber defense competitions.

Similar Presentations: