A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Becoming Mallory – How to Win Creds and Influence Devices Derbycon 2012 (Hacking Illustrated Series InfoSec Tutorial Videos)

Becoming Mallory – How to Win Creds and Influence Devices
Derbycon 2012

Imagine an attack that is effective at 99% of organizations throughout the world. Now imagine that attack will yield you credentials and information that could allow you to completely take over and/or shut down an organization. Now imagine there are no solid defenses for such an attack and it goes largely unnoticed. Sounds like something off the fiction shelves, but it’s not. By leveraging one or multiple Man in the Middle attacks, a malicious person could very easily gain the “keys of the kingdom” in almost all organizations worldwide. With that power they can steal vital information, spread malware and even shut down the entire network of an organization.

Eric Milam

Eric Milam is a senior security consultant with Accuvant LABS’s Enterprise Security practice and has over 14 years of experience in information technology. Eric performs ongoing enterprise security assessments, perimeter penetration testing, and application vulnerability assessments.

Eric has performed innumerable consultative engagements including enterprise security and risk assessments, perimeter penetration testing, vulnerability assessments, social engineering, physical security testing and has extensive experience in PCI compliance controls and assessments.
 

Back to Derbycon 2012 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast