Toor2131 - LanceJames JoshuaBrashards - Tracksploits - Passive Tracker Hacking54:58 - 2

Views: 11
Get Embed Code
years agoRecorded at the 8th www.ToorCon.org Information Security Conference, Sept 30th and Aug 1st, 2006 at the San Diego Convention Center, San Diego, California. Content produced by www.MediaArchives.com --- TRACKSPLOITS – PASSIVE HACKER TRACKING, with Lance James & Joshua Brashars. In a time where bureaucracy can hold you back against a foe that is more agile, fast, and who definitely doesn't care about the laws they break, a new method of forensics is being developed. TrackSploits have been used against phishers, malware authors, and distributors as well as "black hat" hackers to gain intelligence on them in a passive, yet active, manner. These techniques do not break the law, but they will bend them and test the law's resilience. This talk will open your eyes about intelligence gathering and counterespionage against relentless entities dedicated to causing havoc and profiting from it. Lance James, author of Phishing Exposed, has been involved in information security for more than ten years, providing consultation to governments, startups, Fortune 500 companies, and America's top financial institutions. Joshua Brashars is a telecommunications specialist in San Diego. He spends his time working with Secure Science Corporation's External Threat Assessment Team, breaking things apart and taping them back together. Recorded at the 8th www.ToorCon.org Information Security Conference, Sept 30th and Aug 1st, 2006 at the San Diego Convention Center, San Diego, California. Content produced by www.MediaArchives.com --- TRACKSPLOITS – PASSIVE HACKER TRACKING, with Lance James & Joshua Brashars. In a time where bureaucracy can hold you back against a foe that is more agile, fast, and who definitely doesn't care about the laws they break, a new method of forensics is being developed. TrackSploits have been used against phishers, malware authors, and distributors as well as "black hat" hackers to gain intelligence on them in a passive, yet active, manner. These techniques do not break the law, but they will bend them and test the law's resilience. This talk will open your eyes about intelligence gathering and counterespionage against relentless entities dedicated to causing havoc and profiting from it. Lance James, author of Phishing Exposed, has been involved in information security for more than ten years, providing consultat...all » Recorded at the 8th www.ToorCon.org Information Security Conference, Sept 30th and Aug 1st, 2006 at the San Diego Convention Center, San Diego, California. Content produced by www.MediaArchives.com --- TRACKSPLOITS – PASSIVE HACKER TRACKING, with Lance James & Joshua Brashars. In a time where bureaucracy can hold you back against a foe that is more agile, fast, and who definitely doesn't care about the laws they break, a new method of forensics is being developed. TrackSploits have been used against phishers, malware authors, and distributors as well as "black hat" hackers to gain intelligence on them in a passive, yet active, manner. These techniques do not break the law, but they will bend them and test the law's resilience. This talk will open your eyes about intelligence gathering and counterespionage against relentless entities dedicated to causing havoc and profiting from it. Lance James, author of Phishing Exposed, has been involved in information security for more than ten years, providing consultation to governments, startups, Fortune 500 companies, and America's top financial institutions. Joshua Brashars is a telecommunications specialist in San Diego. He spends his time working with Secure Science Corporation's External Threat Assessment Team, breaking things apart and taping them back together.

You need to be a member of Peacepink3 to add comments!

Join Peacepink3

Votes: 0
E-mail me when people leave their comments –