| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
The Great Trojan Demo Have you ever seen a Trojan demonstrated before you live? Was it from one vm to another? Probably! It shows the frightening capability but leaves you wondering: is that really all there is to it? Hacker Ben Miller was asked, "Why doesn't anyone do Trojan demos of how they work over the Internet?" The first reason Ben could provide was, "It's Hard!" However, that's not a reason NOT do it. In this talk, Ben Miller demonstrates his tiered test network, the Trojan communication receiving setup, and demonstrates (ON LIVE VIDEO) how the communications work and are easy to hide.
This talk is focused on teaching the new hacker steps to test their ideas. Additionally, this talk is informative to the defensive side of the table for how to detect and thwart certain Trojan and covert communication behaviors.
Bio:
Information systems specialist turned offensive security expert, Ben Miller brings a unique mix of networking, compliance and security experience to the table. As a Certified Ethical Hacker for Parameter Security, Miller identifies and exploits weaknesses in clients' networks emulating a real-world attack.
Prior to Parameter Security, Ben was employed by Lincoln County Medical Center where he gained extensive knowledge of meeting and maintaining HIPAA compliance regulations on an ongoing basis, creating and deploying as well as securing systems against malicious hackers.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast