| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
Description: To the low hanging fruit of the hacker community, the script kiddies, operational security (OpSec, for short) is a foreign concept. Common sociological factors contribute to the growth of this “sect”. Tracking and identifying these individuals by the trails they leave is considered, by some, to be an art form in and of itself. From the rudimentary protections put in place to protect their servers, to the cross contamination of online personas, we will provide the audience an “over the shoulder” view of the process of scoping, tracking, and identifying individual actors. Bio: “Allison Nixon does penetration testing and incident response, either assisting companies in post-compromise situation, or compromising them. She is intensely interested in all facets of security and continues to perform security research spanning any and all topics. Allison is a regular host on the Pauldotcom podcast, has spoken at B-Sides Boston 2013, local OWASP meetings, and sits on the executive board of MalShare. She also designed the electronics and software for the laser maze at the 2012 Braintank conference.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast