| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
1: Collect Packets, 2: ???, 3: Win! These demos and presentation will help
you learn to passively profile a network through a new Metasploit module by
gathering broadcast and multicast traffic, processing it, and looking at how the
bad guys will use it to own your network. Without sending a packet, many
networks divulge significant information about the assets that are attached.
These broadcast packets can be used to identify hosts, OS's, and other hardware
that is attached. This presentation will show all skill levels how to easily
gather and use this information, how to protect your underpants, and talk about
how to extend the framework for new protocols. Ryan Linn/ Mike Ryan Mike Ryan (justfalter) is a Lead Security Researcher at Trustwave. He is a
member of Trustwave’s SpiderLabs – the advanced security team focused on
penetration testing, incident response, and application security. He has over
thirteen (14) years of information technology administration and engineering
experience, with the last eight (9) years specializing in Information Security
research and development. At Trustwave, Mike is responsible for the design of
Trustwave’s vulnerability scanning engine, implementing network-protocols, and
researching new vulnerabilities.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast