Josh Wright Comments on Offensive Countermeasures...
26
Word Web-Bugs
27
How does it work?
28
BeEF Modules
29
Attribution: Decloak
30
Wireless Countermeasure Example
31
Sneak Preview: Sample "trap"
32
Collect Logins (and attacks!)
33
Attack: Java Payload
34
The Girl With The Dragon Tattoo
35
Happy Ending!
Description:
Explore offensive countermeasures in cybersecurity with Paul Asadoorian and John Strand in this 45-minute conference talk. Delve into successful penetration testing techniques, flaws in defensive layers, and social engineering tactics. Examine case studies on network terms and warning banners, and learn about innovative annoyance techniques like HoneyPorts and web labyrinths. Discover how to exploit vulnerabilities, set traps, and implement prevention strategies. Gain insights into attribution methods, wireless countermeasures, and advanced attack techniques using Java payloads. Understand the practical applications of offensive security measures and their potential impact on cybersecurity strategies.
Offensive Countermeasures - Still Trying to Bring Sexy Back