Hi [[ session.user.profile.firstName ]]

Earth vs. The Giant Spider: Amazingly True Stories of Real Penetration Tests

True Stories of Real Pen Tests - Featuring demos of complex hacks and how business systems can be used against an organization.

Earth vs. the Giant Spider: Amazingly True Stories of Real Pen-Tests brings the audience the most massive collection of weird, downright freaky, and altogether
True Stories of Real Pen Tests - Featuring demos of complex hacks and how business systems can be used against an organization.

Earth vs. the Giant Spider: Amazingly True Stories of Real Pen-Tests brings the audience the most massive collection of weird, downright freaky, and altogether unlikely hacks ever seen in the wild. Through stories and demonstrations, we will take the audience into a bizarre world where odd business logic flaws get you almost free food (including home shipping), sourcing traffic from port 0 allows ownership of the finances a nation, and security systems are used to hack organizations.

This talk will focus on:
•Complex hacks found in real environments
•Showing effective attacks not found with automated methods
•Types of victim organizations and data accessed

By the end of this presentation we hope to have the audience thinking differently about systems and applications that organizations use every day, and how they may be used against them.
Recorded May 22 2012 58 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Rob Havelt, Director of Penetration Testing at Trustwave SpiderLabs
Presentation preview: Earth vs. The Giant Spider: Amazingly True Stories of Real Penetration Tests
Recommended for you:
  • Date
  • Rating
  • Views

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Earth vs. The Giant Spider: Amazingly True Stories of Real Penetration Tests
  • Live at: May 22 2012 4:00 pm
  • Presented by: Rob Havelt, Director of Penetration Testing at Trustwave SpiderLabs
  • From:
Your email has been sent.
or close
You must be logged in to email this