Главная
Study mode:
on
1
tenacity
2
Goal: Bring Sexy Back
3
Goal: Discussions that matte
4
Outline
5
Introduction
6
Successful Penetration Tests
7
Flimsy Defensive "Layers"
8
Social Engineering
9
Passwords
10
Software Vulnerabilities
11
John & Paul Then Thought
12
OODA
13
Case Studies
14
Case Study: Consent to University Network Term
15
Lets Pretend I'm a Lawyer
16
Warning Banners
17
Example: Eric Needed a Warning Banne
18
Annoyance: HoneyPorts
19
Annoyance: Messing with Attackers Head
20
Exploiting Existing Vulnerabilities
21
Annoyance: Setting Traps
22
Spider Trap & WebLabyrinth
23
Prevention: Nessus Example
24
Keeping it "Real"
25
Josh Wright Comments on Offensive Countermeasures...
26
Word Web-Bugs
27
How does it work?
28
BeEF Modules
29
Attribution: Decloak
30
Wireless Countermeasure Example
31
Sneak Preview: Sample "trap"
32
Collect Logins (and attacks!)
33
Attack: Java Payload
34
The Girl With The Dragon Tattoo
35
Happy Ending!
Description:
Explore offensive countermeasures in cybersecurity with Paul Asadoorian and John Strand in this 45-minute conference talk. Delve into successful penetration testing techniques, flaws in defensive layers, and social engineering tactics. Examine case studies on network terms and warning banners, and learn about innovative annoyance techniques like HoneyPorts and web labyrinths. Discover how to exploit vulnerabilities, set traps, and implement prevention strategies. Gain insights into attribution methods, wireless countermeasures, and advanced attack techniques using Java payloads. Understand the practical applications of offensive security measures and their potential impact on cybersecurity strategies.

Offensive Countermeasures - Still Trying to Bring Sexy Back

Add to list