Physical Security Assessments
Presentation I did for the 2007 Information Security Summit in Cleveland, Ohio on Physical Security Assessments.
View ArticleAutomated Penetration Testing With The Metasploit Framework
Presentation I did for the NEO InfoSec Forum in 2008 on the automated features of the Metasploit Framework.
View ArticleAutomated Penetration Testing With Core Impact
Presentation I did for the NEO InfoSec Forum on Core Impact in 2008.
View ArticleInformation Gathering With Maltego
Brief high level presentation on Maltego given to the NEO InfoSec Forum in October 2008.
View ArticlePenetration Testing 2.0 - Corporate Tiger Team
Presentation given at the 2008 Ohio Information Security Summit, October 2008. This was the first presentation I did using skills learned from "presentation zen" which I highly recommend you read!...
View ArticleRise of the Autobots: Into the Underground of Social Network Bots
How do you know that last friend request or Twitter follower was an actual live human being? The truth is...you don't! Bots and bot manufacturers have become rampant in social networks such as...
View ArticleNew School Man-in-the-Middle
During our last tool talk at NEOISF, Matt Neely talked about using a Fon (a wireless access point) with Karmetasploit to attack wireless clients for penetration testing. In this talk we will take this...
View ArticleSocial Zombies: Your Friends Want to Eat Your Brains
In Social Zombies: Your Friends want to eat Your Brains, Tom Eston and Kevin Johnson explore the various concerns related to malware delivery through social network sites. Ignoring the FUD and...
View ArticleStaying Safe & Secure on Twitter
Presentation I gave at the CoolTwitter Conference in Cleveland, Ohio August 7, 2009. I talked about the top 5 1/2 threats to Twitter and ways you can use it safely. Yes, there are more then 5 1/2...
View ArticleEnterprise Open Source Intelligence Gathering
Presented at the Ohio Information Security Summit, October 30, 2009. What does the Internet say about your company? Do you know what is being posted by your employees, customers, or your competition?...
View ArticleSocial Zombies II: Your Friends Need More Brains
In Social Zombies II: Your Friends Need More Brains, Tom Eston, Kevin Johnson and Robin Wood continue the Zombie invasion from "Social Zombies: Your Friends want to eat Your Brains" presented at...
View ArticleSocial Zombies Gone Wild: Totally Exposed and Uncensored
Social networks have jumped onto the geolocation bandwagon with location-based tweets, status updates, check-ins, mayorships, and more. This doesn’t take into account EXIF, QR codes, and advancements...
View ArticleAttacking and Defending Apple iOS Devices
IT loves to use Apple iPhones and iPads, but hates supporting them. For most environments, they represent the exception, and are not subject to standard corporate controls. The reason the exception is...
View ArticleDon't Drop the SOAP: Real World Web Service Testing for Web Hackers
Over the years web services have become an integral part of web and mobile applications. From critical business applications like SAP to mobile applications used by millions, web services are becoming...
View ArticleSmart Bombs: Mobile Vulnerability and Exploitation
Kevin Johnson, John Sawyer and Tom Eston have spent quite a bit of time evaluating mobile applications in their respective jobs. In this presentation they will provide the audience an understanding of...
View ArticleFive Lessons Learned From Breaking Into A Casino: Confessions of a...
Breaking in is easy, real security is hard. Breaching the security of a Casino doesn't have to be as dramatic or dangerous as depicted in the Ocean's Eleven movies. In fact, by simply sitting in a...
View ArticleThe Android vs. Apple iOS Security Showdown
Android and Apple mobile devices have taken the market by storm. Not only are they being used by consumers but they are now being used for critical functions in businesses, hospitals, government and...
View ArticleSocial Zombies: Rise of the Mobile Dead
Just when you thought “bath salts” were turning innocent humans into flesh eating Zombies in Florida…mobile devices have begun taken over the world like an infectious Zombie virus outbreak. Tablets...
View ArticleCash is King: Who's Wearing Your Crown?
Show me the money. If hackers were able to manipulate the world’s accounting systems, governments and corporations would be in a frenzy. Guess what? Hackers can…and will. In this presentation we...
View ArticlePrivacy Exposed: Ramifications of Social Media and Mobile Technology
Mobile devices and applications have taken the world by storm. Millions of consumers are using these devices for everything from conducting financial transactions, accessing health care information...
View Article