| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
Have you ever seen a Trojan demonstrated before you live? Was it from one vm to another? Probably! It shows the frightening capability but leaves you wondering: is that really all there is to it? Hacker Ben Miller was asked, ?Why doesn't anyone do Trojan demos of how they work over the Internet?? The first reason Ben could provide was, ?It?s Hard!? However, that?s not a reason NOT do it. In this talk, Ben Miller demonstrates his tiered test network, the Trojan communication receiving setup, and demonstrates (ON LIVE VIDEO) how the communications work and are easy to hide. This talk is focused on teaching the new hacker steps to test their ideas. Additionally, this talk is informative to the defensive side of the table for how to detect and thwart certain Trojan and covert communication behaviors. Bio: Information systems specialist turned offensive security expert, Ben Miller brings a unique mix of networking, compliance and security experience to the table. As a Certified Ethical Hacker for Parameter Security, Miller identifies and exploits weaknesses in clients? networks ? emulating a real-world attack. Using this information to better protect clients, Miller explains his findings and recommendations to clients nationwide. Ben?s expertise is featured in the classroom, teaching Information Security courses such as EC-Council?s Certified Ethical Hacker, a course in which he contributed to the exam questions for version 7. Ben also authored a C|EH supplement for EC-Council which will be prominently featured in the next release of C|EH. Ben also teaches Comptia?s Security+ and End-User Security awareness training. Prior to Parameter Security, Ben was employed by Lincoln County Medical Center where he gained extensive knowledge of Windows and Linux hardware platforms in addition to HIPAA compliance regulations. His duties included: meeting and maintaining HIPAA compliance regulations on an ongoing basis; developing and update security policies and procedures plus implementing them; supporting over 250 systems hospital-wide; managing and implementing several Electronic Medical Records roll-outs; creating and deploying as well as securing systems against malicious hackers. While working for Midwest Information Technology Group, Miller dealt with various hardware and software platforms as well as provided technical support for staff and customers. While in high school, he completed and supported a network roll-out for the R-III Pike County School District. Other areas of Miller?s expertise include: developing and executing security awareness training programs for end-users and teaching information security courses via Parameter Security?s Hacker University. Since the age of 10, Miller has been learning all he can about computers systems which led him to a degree in Computer Systems and Networking from Indian Hills Community College. In addition to being C|EH Certified, Miller is a Certified Hacking Forensic Investigator and a Certified Information Systems Security Professional. Miller has also been certified at a Qualified Security Auditor by the Payment Card Industry Council. Ben?s expertise has also been showcased on NBC?s Today Show and Lifehacker.com.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast