Level: Advanced
Avril Salter
Ph.D.
Principal Technologist
Next Direction Technologies
Ethical Hacking is the best way to find vulnerabilities the way real hackers do: by using their tools and processes. This session continues executing the attack plan from session #1. Once hackers build a nefarious network map they begin attacking those networks. You’ll see real-time wired and wireless network penetration attacks using current hacker tools. Special attention is paid to wireless because it provides a more favorable cost/benefit to hackers. You’ll see tools that silently snoop and extract data from your servers as well as tools like the Low Orbit Ion Cannon that have only one purpose: destroy your assets. Warning: this session is not for those with weak constitutions as many of the attacks are difficult or impossible against which to defend.
You will learn:
-
How to select and attack the most vulnerable network
-
How to deploy and manage network snooping and enumeration tools
-
How to decimate servers and network assets with freely available hacker tools