♫musicjinni

DEF CON 22 - Anch - The Monkey in the Middle: A pentesters guide to playing in traffic.

video thumbnail
Slides here: https://www.defcon.org/images/defcon-22/dc-22-presentations/Anch/DEFCON-22-Anch-The-Monkey-In-the-Middle.pdf

The Monkey in the Middle: A pentesters guide to playing in traffic.
Anch (MIKE GUTHRIE)
Prank your friends, collect session information and passwords, edit traffic as it goes by.. become the Monkey(man)-In-The-Middle and do it all…

This presentation will teach you a penetration testers view of man in the middle (MITM) attacks. It will introduce the tools, techniques and methods to get traffic to your hosts. Demonstrations of the tools and methods involved will be presented. Come learn new and interesting ways to prank your friends, experience the all porn internet (redux), learn what mallory is and how to use it, learn how to direct traffic to your proxy, deal with SSL and certificates in interesting ways, and make sure you go (mostly) undetected.

Anch is the lead for the Chickasaw Nation Industries Red Team performing penetration tests, and accreditation's for the public and private sector.

Anch has 11 years experience in cyber security. He was the Network Security Architect at a major power administration. At Mentor Graphics he spent time as a network engineer providing enterprise networking, firewall and VPN support for a global network comprising of 72 connected sites worldwide. He has been involved in or lead over 75 penetration tests on over 200 networks.

Anch's background related to control systems is unrivaled in the bulk power generation and transmission areas. During this time he developed unique perspectives on the areas of compliance and regulation in the power industry.

Twitter: @boneheadsanon

DEF CON 22 - Deviant Ollam & Howard Payne - Elevator Hacking - From the Pit to the Penthouse

DEF CON 22 - Brent White - Corporate Espionage

DEF CON 22 - Glenn Wilkinson - Practical Aerial Hacking & Surveillance

DEF CON 22 - Panel - DEF CON the Mystery, Myth, and Legend

DEF CON 22 - Tim Strazzere and Jon Sawyer - Android Hacker Protection Level 0

DEF CON 22 - Ryan Kazanciyan and Matt Hastings, Investigating PowerShell Attacks

DEF CON 22 - Paul Such 0x222 and Agix - Playing with Car Firmware or How to Brick your Car

DEF CON 22 - Chris Littlebury - Home Alone with localhost: Automating Home Defense

DEF CON 22 - Jim Denaro and Tod Beardsley - How to Disclose an Exploit Without Getting in Trouble

DEF CON 22 - Dr. Phil Polstra - Am I Being Spied On?

DEF CON 22 - Anch - The Monkey in the Middle: A pentesters guide to playing in traffic.

DEF CON 22 - Panel- Ephemeral Communications: Why and How?

DEF CON 22 - Zoltán Balázs - Bypass firewalls, application white lists...

DEF CON 22 - Weston Hecker - Burner Phone DDOS 2 dollars a day : 70 Calls a Minute

DEF CON 22 - Dominic White and Ian de Villiers - Manna from Heaven

DEF CON 22 - Paul McMillan - Attacking the Internet of Things using Time

DEF CON 22 - Alexandre Moneger - Generating ROP payloads from numbers

DEF CON 22 - Lucas Morris and Michael McAtee - ShareEnum: We Wrapped Samba So You Don’t Have To

DEF CON 22 - Philip “Soldier of Fortran” Young - From root to SPECIAL: Pwning IBM Mainframes

DEF CON 22 - David Litchfield - Oracle Data Redaction is Broken

DEF CON 22 - Eijah - Saving Cyberspace by Reinventing File Sharing

DEF CON 22 - Luca "kaeso" Bruno & Mariano "emdel" Graziano - Through the Looking-Glass

DEF CON 22 - Gene Bransfield - Weaponizing Your Pets: The War Kitteh and the Denial of Service Dog

DEF CON 22 - Dr. Phil Polstra and Captain Polly - Cyberhijacking Airplanes: Truth or Fiction?

DEF CON 22 - Joe FitzPatrick and Miles Crabill - NSA Playset: PCIe

DEF CON 22 - Graham, Mcmillan, and Tentler - Mass Scanning the Internet: Tips, Tricks, Results

How To Write Your Own Macchanger In Python

Disclaimer DMCA