A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Common misconfigurations that lead to a breach - (BSides Boston 2015) (Hacking Illustrated Series InfoSec Tutorial Videos)

Common misconfigurations that lead to a breach

Justin Tharpe

BSides Boston 2015

I would like to do a talk about different misconfiguration I have seen over the years as a Network Engineer that lead to vulnerabilities. I will use sanitized examples of configurations that I have seen and would consider "common". I will then have demos of how those misconfiguration can lead to compromise of your network.

Bio: Justin Tharpe OSCP - I am a Network Engineer by day and security enthusiast at night. I have been implementing and supporting systems for 9+ years. I have seen a lot of things misconfigured in the wild that could very easily lead to a breach. I want to use this experience and these examples to help educate people to better understand why these configurations are a bad idea by providing examples of how to execute these attacks. I have a blog I run with two others that focuses on infosec. We produce vulnerable VM's for www.vulnhub.com we also have a CTF team, and we are starting to provide free infosec training to the community.

Back to BSides Boston 2015 list

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast