A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Search Irongeek.com:

Affiliates:
ISDPodcast Button
RootSecure Button
Social-engineer-training Button
Irongeek Button

Web Hosting:
Dreamhost Logo
Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Alice Goes Deeper (Down the Rabbit Hole) – Redirection 2.0 - Nathan Magniez Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos)

Alice Goes Deeper (Down the Rabbit Hole) – Redirection 2.0 - Nathan Magniez
Derbycon 2013

Description: “At DerbyCon 2.0, we learned to keep yourself anonymous and out of your target’s logs. In this lecture we will continue to cover the topic of redirection and how to use it to send our packets through to our end target. We will also address more complex issues such as redirecting exploits, remote shells and backdoor callbacks through redirectors. Understanding redirection, and how to accomplish it manually, is one of the most important concepts for a PenTester. This talk will cover everything you need to accomplish that goal.”

Bio: “Nathan Magniez is a Senior Computer Network Operations (CNO) Instructor and Course Developer at TeleCommunication Systems’ Art of Exploitation Training Center in Hanover, MD. Nathan started his career in the United States Marines Corps. Originally trained as a Russian Cryptologic Linguist, he realized that his greatest potential and aptitude fell within Digital Network Exploitation (DNE). During his time in the Marine Corps, he served on tactical teams, at 2nd Radio Battalion in Camp Lejeune, that focused on the collection and exploitation of wired and wireless networks. Nathan also served as an Computer Network Operator for the Department of Defense. Prior to joining the TCS Cyber Intelligence Group, he worked at Qualys, Inc. on their team of Vulnerability Research and Detection engineers. Nathan worked as an Incident Responder and Special Investigator on the National Incident Response Team (NIRT) at the Federal Reserve Bank of New York and San Francisco in support of the United States Treasury. In addition to this role, Nathan also focused on Vulnerability Assessments and Penetration Testing. Nathan is also actively involved with Hackers For Charity. The program Hack Hunger directly funds and supplements HFC’s Food For Work program. For more information on how to help HFC, please see: www.hackhunger.com www.hackersforcharity.org”

Back to Derbycon 2013 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2014, IronGeek
Louisville / Kentuckiana Information Security Enthusiast