Presented at NolaCon 2015
June 14, 2015, 11 a.m.
As the meaty corporate network dissipates into the free range organic vegan cloud based tofu that is most silicon valley startups, Red Teaming engagements rely more on attacks that target users in a personal way. In this talk I'll share some tips, tricks, and tales of how high interaction with select users becomes the best way to bypass modern security controls.
Josh Schwartz / FuzzyNop
Forged in the fire of yoloscoped Red Team operations, these space-wolves learned the hard way. The dark abyss of the modern environment left the old ways obsolete. Suddenly, OSX shells forced them into a new frontier demanding new tools, new tactics, and new blackhat mac hacks. They braved the darkest of alcoves to peel back the shroud surrounding the arcane art of OSXploitation. Cataclysmic corporate fracturing can’t stop the signal and it surely doesn’t break up a full blooded dolphin squad. While heavily obscured, their message is clear. All entrances need a key to open. That key is given ... 🔑