| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
DLet’s again, time travel to 2003 with today’s tools and own everything. This
talk takes you inside the red teams at the North East, Mid Atlantic, Pacific
Rim, and National Collegiate Cyber Defense competition events. This talk is a
revolution compared to last years Dirty Red Team Tricks. Each year, the students
up their game and the red team does as well. You’ll learn how sophisticated bots
allowed these red teams to persist deeply, automatically harvest plain-text
credentials, and scale their efforts during these events. Once again, you’ll
catch some niftier persistence tricks in UNIX and Windows. If you defend
networks or play in these events, come and see what others are using on you. If
you think you’ll find yourself on a red team, you need to come to this talk.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast