| |||||
| |||||
Search Irongeek.com: ![]() ![]()
Help Irongeek.com pay for bandwidth and research equipment: |
Pretending to be an employee is one thing, but owning layers of identities is what leads to owning the data center. In this presentation you will listen to real world scenarios that led to armed guards opening the server room for the "employee" to Secretaries handing over an Executive's laptop. All of this and more, from parking lot to pwnage. Bio: Brent is currently an Offensive Security Consultant within Solutionary, and has recently spoken at Def Con 22, ISSA International and B-Sides Nashville. His experience includes Internal and External Penetration Assessments, Social Engineering and Physical Security Assessments, Wireless and Application Vulnerability Assessments and more. Brent has held the role of Web/Project Manager and IT Security Director at the headquarters of a global franchise company. His specialty is in Application, Social Engineering and Wireless Assessments.
Tim is currently an Offensive Security Consultant within Solutionary, and has recently spoken at Def Con 22, ISSA International and B-Sides Nashville. His experience includes Internal and External Penetration Assessments, Social Engineering and Physical Security Assessments, Wireless and Application Vulnerability Assessments and more. Tim has held information and physical security and management roles across multiple industries including healthcare and government. He has conducted highly successful Red Team Assessments.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast