MetaPhish pt 2 Val Smith, Colin Ames & David Kerb Black Hat - USA - 2009

Subscribers:
6,120
Published on ● Video Link: https://www.youtube.com/watch?v=IvROmTerUN0



Duration: 59:28
6 views
0


MetaPhish
Attackers have been increasingly using the web and client side attacks in order to steal information from victims. The remote exploit paradigm is shifting from the open port to the browser and email client. Penetration testers need to take these techniques into account in order to provide realistic tests.

In the past several years there have been numerous presentations on techniques for specific client side attacks and vulnerabilities. This talk will focus on building a phishing framework on top of Metasploit that pen testers can use to automate phishing and increase their overall capabilities. We will also cover some techniques for SpearPhishing on pen tests, second stage backdoors, and extensive communication over TOR.

Black Hat - USA - 2009
Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2021-12-28Automated Malware Similarity Analysis Daniel Raygoza Black Hat - USA - 2009
2021-12-28Beckstrom’s Law Rod Beckstrom Black Hat - USA - 2009
2021-12-28Demystifying Fuzzers Michael Eddington Black Hat - USA - 2009
2021-12-28Johnny Long Me to We Johnny Long Black Hat - USA - 2009
2021-12-28BitTorrent Hacks Michael Brooks Black Hat - USA - 2009
2021-12-28MetaPhish pt 1 Val Smith, Colin Ames & David Kerb Black Hat - USA - 2009
2021-12-28Economics and the Underground Economy Cormac Herley Black Hat - USA - 2009
2021-12-28Black Ops of PKI Dan Kaminski Black Hat - USA - 2009
2021-12-28Kismet and MSF Mike Kershaw Black Hat - USA - 2009
2021-12-28Fighting Russian Cybercrime Mobsters Dmitri Alperovitch Black Hat - USA - 2009
2021-12-28MetaPhish pt 2 Val Smith, Colin Ames & David Kerb Black Hat - USA - 2009
2021-12-28Embedded Management Interfaces Hristo Bojinov, Elie Bursztein, Dan Boneh
2021-12-28Metasploit Autopsy Reconstructing the Crime Scene Peter Silberman, Steve Davis
2021-12-28Fuzzing the Phone in Your Phone Charlie Miller, Collin Mulliner Black Hat - USA - 2009
2021-12-28Exploiting Rich Content Riley Hassell Black Hat - USA - 2009
2021-12-28Mo’ Money Mo’ Problems Jeremiah Grossman, Trey Ford Black Hat - USA - 2009
2021-12-28Gizmo Rachel Engel Black Hat - USA - 2009
2021-12-28Exploratory Android Surgery Jesse Burns Black Hat - USA - 2009
2021-12-28Breaking the “Unbreakable” Oracle with Metasploit Chris Gates Black Hat - USA - 2009
2021-12-28Global Spying Steve Topletz, Jonathan Logan, Kyle Williams
2021-12-28Breaking the Security Myths of Extended Validation SSL Certificates Alexander Sotirov, Mike Zusman



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering