Security and Ethical Hacking

W02 Ethical Hacking Part 1: Recon and Information Gathering

August 13th, 2014

9:30am - 12:30pm

Level: Intermediate

Mike Danseglio

Mike Danseglio

Principal Technologist

Next Direction Technologies

Avril Salter

Ph.D.

Principal Technologist

Next Direction Technologies

Ethical Hacking is the best way to find vulnerabilities the way real hackers do: By using their tools and processes. This session explores how hackers work and how they begin their attacks through careful planning. You'll learn how a hacker decides your assets are hack-worthy and how they begin to attack your systems without sending you a single packet. You'll also see how hackers build a network map of your enterpriseā€¦ just like your own IT department does but for planning and attacking your systems. This session will include demonstrations of live hacking including social media scanning and external network footprinting.

At the end of this session an attendee will be able to apply hacker techniques to examine a network, determine and prioritize optimal targets for hacking, select the most appropriate attack for a given asset, and create and implement an attack plan using hacker methodologies.