Quantcast
Channel: Slideshows by User: agent0x0
Browsing all 40 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Physical Security Assessments

Presentation I did for the 2007 Information Security Summit in Cleveland, Ohio on Physical Security Assessments.

View Article


Image may be NSFW.
Clik here to view.

Automated Penetration Testing With The Metasploit Framework

Presentation I did for the NEO InfoSec Forum in 2008 on the automated features of the Metasploit Framework.

View Article


Image may be NSFW.
Clik here to view.

Automated Penetration Testing With Core Impact

Presentation I did for the NEO InfoSec Forum on Core Impact in 2008.

View Article

Image may be NSFW.
Clik here to view.

Information Gathering With Maltego

Brief high level presentation on Maltego given to the NEO InfoSec Forum in October 2008.

View Article

Image may be NSFW.
Clik here to view.

Penetration Testing 2.0 - Corporate Tiger Team

Presentation given at the 2008 Ohio Information Security Summit, October 2008. This was the first presentation I did using skills learned from "presentation zen" which I highly recommend you read!...

View Article


Image may be NSFW.
Clik here to view.

Rise of the Autobots: Into the Underground of Social Network Bots

How do you know that last friend request or Twitter follower was an actual live human being? The truth is...you don't! Bots and bot manufacturers have become rampant in social networks such as...

View Article

Image may be NSFW.
Clik here to view.

New School Man-in-the-Middle

During our last tool talk at NEOISF, Matt Neely talked about using a Fon (a wireless access point) with Karmetasploit to attack wireless clients for penetration testing. In this talk we will take this...

View Article

Image may be NSFW.
Clik here to view.

Social Zombies: Your Friends Want to Eat Your Brains

In Social Zombies: Your Friends want to eat Your Brains, Tom Eston and Kevin Johnson explore the various concerns related to malware delivery through social network sites. Ignoring the FUD and...

View Article


Image may be NSFW.
Clik here to view.

Staying Safe & Secure on Twitter

Presentation I gave at the CoolTwitter Conference in Cleveland, Ohio August 7, 2009. I talked about the top 5 1/2 threats to Twitter and ways you can use it safely. Yes, there are more then 5 1/2...

View Article


Image may be NSFW.
Clik here to view.

Enterprise Open Source Intelligence Gathering

Presented at the Ohio Information Security Summit, October 30, 2009. What does the Internet say about your company? Do you know what is being posted by your employees, customers, or your competition?...

View Article

Image may be NSFW.
Clik here to view.

Social Zombies II: Your Friends Need More Brains

In Social Zombies II: Your Friends Need More Brains, Tom Eston, Kevin Johnson and Robin Wood continue the Zombie invasion from "Social Zombies: Your Friends want to eat Your Brains" presented at...

View Article

Image may be NSFW.
Clik here to view.

Social Zombies Gone Wild: Totally Exposed and Uncensored

Social networks have jumped onto the geolocation bandwagon with location-based tweets, status updates, check-ins, mayorships, and more. This doesn’t take into account EXIF, QR codes, and advancements...

View Article

Image may be NSFW.
Clik here to view.

Attacking and Defending Apple iOS Devices

IT loves to use Apple iPhones and iPads, but hates supporting them. For most environments, they represent the exception, and are not subject to standard corporate controls. The reason the exception is...

View Article


Image may be NSFW.
Clik here to view.

Don't Drop the SOAP: Real World Web Service Testing for Web Hackers

Over the years web services have become an integral part of web and mobile applications. From critical business applications like SAP to mobile applications used by millions, web services are becoming...

View Article

Image may be NSFW.
Clik here to view.

Smart Bombs: Mobile Vulnerability and Exploitation

Kevin Johnson, John Sawyer and Tom Eston have spent quite a bit of time evaluating mobile applications in their respective jobs. In this presentation they will provide the audience an understanding of...

View Article


Image may be NSFW.
Clik here to view.

Five Lessons Learned From Breaking Into A Casino: Confessions of a...

Breaking in is easy, real security is hard. Breaching the security of a Casino doesn't have to be as dramatic or dangerous as depicted in the Ocean's Eleven movies. In fact, by simply sitting in a...

View Article

Image may be NSFW.
Clik here to view.

The Android vs. Apple iOS Security Showdown

Android and Apple mobile devices have taken the market by storm.  Not only are they being used by consumers but they are now being used for critical functions in businesses, hospitals, government and...

View Article


Image may be NSFW.
Clik here to view.

Social Zombies: Rise of the Mobile Dead

Just when you thought “bath salts” were turning innocent humans into flesh eating Zombies in Florida…mobile devices have begun taken over the world like an infectious Zombie virus outbreak. Tablets...

View Article

Image may be NSFW.
Clik here to view.

Cash is King: Who's Wearing Your Crown?

Show me the money. If hackers were able to manipulate the world’s accounting systems, governments and corporations would be in a frenzy. Guess what? Hackers can…and will. In this presentation we...

View Article

Image may be NSFW.
Clik here to view.

Privacy Exposed: Ramifications of Social Media and Mobile Technology

Mobile devices and applications have taken the world by storm. Millions of consumers are using these devices for everything from conducting financial transactions, accessing health care information...

View Article
Browsing all 40 articles
Browse latest View live