Security and Ethical Hacking

W04 Ethical Hacking: Network Penetration, Snooping, and Denial of Service

August 5th, 2015

9:15am - 12:15pm

Level: Intermediate Advanced

Mike Danseglio

Mike Danseglio

Principal Technologist

Next Direction Technologies

Avril Salter

Ph.D.

Principal Technologist

Next Direction Technologies

Once hackers build a map of your network, they'll begin conducting attacks. In this session, you'll see real-time wired and wireless network penetration attacks using current hacker tools. We'll pay special attention to wireless networks as they provide a more favorable cost:benefit to hackers. You'll see tools that silently snoop and extract data from your servers, as well as tools like the Low Orbit Ion Cannon that have only one purpose: destroy your assets. Warning: this session is not for those with weak constitutions as many of the attacks are difficult or impossible against which to defend. This session will include demonstrations of live wireless hacking and Denial of Service (DOS) attacks.

You will learn:

  • How to select and attack the most vulnerable network
  • How to deploy and manage network snooping and enumeration tools
  • How to decimate servers and network assets with freely available hacker tools