Presented at
HOPE Number Six (2006),
July 23, 2006, 10 a.m.
(60 minutes).
In a time where bureaucracy can hold you back against a foe that is more agile, fast, and who definitely doesn't care about the laws they break, a new method of forensics is being developed. TrackSploits have been used against phishers, malware authors, and distributors as well as "black hat" hackers to gain intelligence on them in a passive, yet active, manner. These techniques do not break the law, but they will bend them and test the law's resilience. Techniques include tracking attackers behind proxies, breaking encryption algorithms to unmask IP addresses, stealing data back from the phishers in real time, and using cross-site attacks to track malware authors. This talk will open your eyes about intelligence gathering and counterespionage against relentless entities dedicated to causing havoc and profiting from it.
Presenters:
-
Lance James
Lance James, author of Phishing Exposed, has been involved in information security for more than ten years, providing consultation to governments, startups, Fortune 500 companies, and America's top financial institutions. He has devised techniques to prevent, track, and detect online fraud as a chief scientist with Secure Science Corporation (http://www.securescience.net), a security software company that is busy tracking over 53 phishing groups.)
-
Joshua Brashars
Joshua Brashars is a telecommunications specialist in San Diego. He spends his time working with Secure Science Corporation's External Threat Assessment Team, breaking things apart and taping them back together. Joshua has contributed to several books with Syngress Publishing and has presented at conferences and universities across the United States.
Links:
Similar Presentations: