Overview
Syllabus
tenacity
Goal: Bring Sexy Back
Goal: Discussions that matte
Outline
Introduction
Successful Penetration Tests
Flimsy Defensive "Layers"
Social Engineering
Passwords
Software Vulnerabilities
John & Paul Then Thought
OODA
Case Studies
Case Study: Consent to University Network Term
Lets Pretend I'm a Lawyer
Warning Banners
Example: Eric Needed a Warning Banne
Annoyance: HoneyPorts
Annoyance: Messing with Attackers Head
Exploiting Existing Vulnerabilities
Annoyance: Setting Traps
Spider Trap & WebLabyrinth
Prevention: Nessus Example
Keeping it "Real"
Josh Wright Comments on Offensive Countermeasures...
Word Web-Bugs
How does it work?
BeEF Modules
Attribution: Decloak
Wireless Countermeasure Example
Sneak Preview: Sample "trap"
Collect Logins (and attacks!)
Attack: Java Payload
The Girl With The Dragon Tattoo
Happy Ending!