A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Detecting phishing attacks with DNS reconnaissance - Mike Saunders Derbycon 2015 (Hacking Illustrated Series InfoSec Tutorial Videos)

Detecting phishing attacks with DNS reconnaissance
Mike Saunders
Derbycon 2015

People can and will click on anything. As a result, attackers continue to use phishing attacks to gain footholds in organizations. Using DNS reconnaissance techniques, it is possible to identify potentially imminent phishing attacks using typosquatting techniques. In this talk we will discuss how to monitor for these attacks using DNS and demonstrate a new tool to automate this recon to generate alerts of possible attacks.

Mike performs penetration testing and has lead the incident response team at a health insurance company since 2007 as well as owning Hardwater Information Security. Mike has been active attending and presenting at security conferences in the upper midwest and local ISSA meetings. When he's not at work, Mike enjoys hiking, fishing, and playing in a horn rock band.

@hardwaterhacker

Back to Derbycon 2015 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast