We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

RECON VILLAGE- Winning a SANS 504

00:00

Formal Metadata

Title
RECON VILLAGE- Winning a SANS 504
Subtitle
without winning a SANS 504
Alternative Title
Winning a SANS 504 CTF without winning a SANS CTF
Title of Series
Number of Parts
322
Author
License
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
When a security professional who is running a SANS training course challenges you to ‘Socially engineer the answer to the CTF’ out of him, you have a choice: choose something to make him laugh and garner clues to aid you in owning the network and walking away with a CTF coin, or, take it as a personal challenge and a call to own your instructor. Against better judgement, the advice of his peers (‘you shouldn’t attack a SANS instructor’) and with the threat of an ex Navy Seal above him, wbbigdave took the second path. Learn how good reconnaissance, modern technology which is billed as an aid to connectivity and convenience, can be used to fully draw even then most switched on and vigilant of security professionals down the rabbit hole. Including but not limited to Facebook and Google who lost significant sums of money to similar techniques. Learn how to walk away with a challenge coin without winning the CTF.
Demo (music)Presentation of a groupStorage area networkRadical (chemistry)Computer animation
Multiplication signRandomizationStorage area networkVolume (thermodynamics)Filter <Stochastik>Game controllerProcess (computing)CASE <Informatik>EmailField (computer science)Link (knot theory)Computer networkCuboidEnterprise architectureComputer fileRadical (chemistry)QuicksortMereologyShared memoryInformation securityNuclear spacePhishingSystem on a chip
Hill differential equationExecution unitLevel (video gaming)Dependent and independent variablesPeer-to-peerSoftware testingSemiconductor memorySpacetimeEmailInformation securitySocial classGastropod shellComputer networkShared memoryVirtual machineIncidence algebraSpring (hydrology)Social engineering (security)TwitterWindowCore dumpPresentation of a groupGoodness of fitLink (knot theory)Computer forensicsFlagQuicksortStorage area networkInternetworkingProcess (computing)Touch typingElectronic mailing listOpen setPlanningHacker (term)BitStudent's t-testFacebookInternet service providerPhishing
WebsiteFreeware
EmailForm (programming)PlastikkarteGeometryRoundness (object)CubeSign (mathematics)InformationInterface (computing)
EmulationGastropod shellInterface (computing)Type theoryIdentity managementRoundness (object)EmailCubeAddress spaceComputer network
Right angleEmailMereologyElectronic signatureEnvelope (mathematics)Cartesian coordinate systemAddress spaceFilm editingBitInformationCommunications protocolCASE <Informatik>
Computer iconInclusion mapMultiplication signFacebookType theoryAddress spaceEmailPhysicalismElectronic signatureJava appletCASE <Informatik>BitQuicksortClassical physicsObservational studyChain
Execution unitStorage area networkElectronic signatureGoogolEmailFacebookContent (media)Game controller1 (number)Point (geometry)Firewall (computing)Multiplication sign
Hardware-in-the-loop simulationMaxima and minimaEmpennageHill differential equationLink (knot theory)TwitterCore dumpInformation securityWebsiteMetropolitan area networkContext awarenessHookingAddress spaceStorage area networkFlagPresentation of a groupEmailOptical disc driveMotion captureMultiplication signContent (media)
Domain nameAddress spaceInformationSocial engineering (security)Proxy serverEmailQuicksort1 (number)
QuadrilateralDegree (graph theory)Presentation of a groupEmail1 (number)Disk read-and-write headMetropolitan area networkProof theoryKey (cryptography)Storage area networkGoodness of fitChainContent (media)
Convex hullCartesian coordinate systemInformationComputer programmingEmailEnvelope (mathematics)Office suiteComa BerenicesDisk read-and-write headMenu (computing)Source codeView (database)Computer animation
EmailAddress spaceComputer animation
Uniform boundedness principleEmailStreaming mediaStorage area networkMereologyStudent's t-testPoint (geometry)Disk read-and-write headField (computer science)Virtual machineFlagBitSlide ruleOnline helpKernel (computing)Computer animation
Transcript: English(auto-generated)