Description: Learn to understand the sweet complexity that is redirection. Keep yourself anonymous and out of your target's logs. In this lecture we will cover the topic of redirection and how to use it to send our (exploit) packets through to our end target.
Nathan Magniez came on board with AoE in the spring of 2009 as a senior cyber instructor. Since his arrival, Nathan has focused his attention on the evolution of the Art of Exploitation™ training suite and instruction of those courses. Nathan started his career with a five-year enlistment in the United States Marines Corps. Originally trained as a Russian Cryptologic Linguist, he realized that his greatest potential and aptitude fell within Digital Network Exploitation (DNE). During his time in the Marine Corps, he served on tactical teams that focused on the collection and exploitation of wired and wireless networks. Nathan also served as an operator on the National Security Agency's Red Team, which sought to directly improve the security standpoint of our nation's key networks. Prior to joining the TCS Cyber Intelligence Group, he worked at Qualys, Inc. on their team of Vulnerability Research and Detection engineers. Nathan worked as an Incident Responder and Special Investigator on the National Incident Response Team (NIRT) at the Federal Reserve Bank of New York and San Francisco in support of the United States Treasury. In addition to this role, Nathan also focused on Vulnerability Assessments and Penetration Testing.
Tags: securitytube , hacking , hackers , information security , convention , computer security , derbycon-2012 ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.