Security and Ethical Hacking

W06 Ethical Hacking Part 2: Network Penetration, Snooping, and Denial of Service

August 13th, 2014

2:00pm - 5:00pm

Level: Intermediate

Mike Danseglio

Mike Danseglio

Principal Technologist

Next Direction Technologies

Avril Salter

Ph.D.

Principal Technologist

Next Direction Technologies

Ethical Hacking is the best way to find vulnerabilities the way real hackers do: By using their tools and processes. Once hackers build a nefarious network map, they begin attacking those networks. You'll see real-time wired and wireless network penetration attacks using current hacker tools. Special attention is paid to wireless because it provides a more favorable cost/benefit to hackers. You'll see tools that silently snoop and extract data from your servers as well as tools like the Low Orbit Ion Cannon that have only one purpose: To destroy your assets. Be warned! This session is not for those with weak constitutions as many of the attacks are difficult or impossible against which to defend. This session will include demonstrations of live wireless hacking and Denial of Service (DOS) attacks.

At the end of this session an attendee will be able to select and attack the most vulnerable network, deploy and manage network snooping and enumeration tools, and decimate servers and network assets with freely available hacker tools.