Security

TMW04 Ethical Hacking: Recon, Data Gathering, and Target Selection

11/18/2015

11:00am - 12:15pm

Level: Introductory to Intermediate

Mike Danseglio

Mike Danseglio

Principal Technologist

Next Direction Technologies

Avril Salter

Ph.D.

Principal Technologist

Next Direction Technologies

You'll learn how a hacker decides which of your assets are hack-worthy and how they begin to attack your systems without sending a single packet. You'll also see how hackers build a network map of your enterprise—just like your own IT department—but for planning and attacking your systems. This session will include demonstrations of live hacking including social media scanning and external network footprinting.

You will learn:

  • How to determine and prioritize optimal targets for hacking
  • How to select the most appropriate attack for a given asset
  • How to create and implement an attack plan using hacker methodologies