Hacking Dumber Redux: More Dumberer
Tim Medin to Speak at Wild West Hacking Fest San Diego
Red Siege Principal Consultant Tim Medin will present at 4pm Wednesday, March 11 at the Wild West Hackin’ Fest – Way West in San Diego, California.
In Medin’s presentation “Hacking Dumberly Redux: More Dumberer” he will discuss the dumbest red team tricks and hacks encountered over the years.
“We are going to take the A out of APT (again), because so few attackers really need to use advanced techniques,” Medin said. “We’ll also discuss the simple defenses that make an attacker’s life much more difficult.”
In addition to his expert instruction, Medin will be bringing a new Red Siege shirt to giveaway and will have a challenge/puzzle for attendees to attempt for commemorative coins.
“We were delighted to be invited to the Wild West Hackin’ Fest – Way West. Every time we present we want those in the audience to have immediate, applicable insights to implement and to have a great time,” Medin said. “At the end of the day, we are all on the same side, trying to stop the bad guys before they break in and cause harm. We are always happy to share what we have learned through our work at Red Siege.”
Wild West Hackin’ Fest – Way West will be held from March 10 – 13 in San Diego, California with an associated two day training on March 10 and 11.
About Medin
Twitter: https://twitter.com/TimMedin
Linked In: https://www.linkedin.com/in/TimMedin
Tim Medin is the founder and Principal Consultant at Red Siege. Tim is also a Principal SANS Instructor, the SANS MSISE Program Director and a SANS course author. Through the course of his career, Tim has performed penetration tests on a wide range of organizations and technologies. He gained information security experience in a variety of industries including previous positions in control systems, higher education, financial services, and manufacturing. Tim is an experienced international speaker, having presented to organizations around the world. Tim the creator of the Kerberoasting, a technique to extract kerberos tickets in order to offline attack the password of enterprise service accounts. Tim earned his MBA through the University of Texas. Tim holds the GWAPT, GPEN, GMOB, GCED, and GCIH certifications and he previously held the CCNA certification.
[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section]
Related Stories
View MoreIntroduction to Sliver
By Red Siege | November 7, 2022
By: Justin Palk, Security Consultant Around the time Tim decided he was going to give a Siegecast on selecting a C2, I finished building out a test Windows AD domain […]
Learn MoreMoving beyond T4 – Deconstructing Nmap Tuning
By Red Siege | July 6, 2022
by Alex Norman, Senior Security Consultant Nmap -T4 -iL targets.txt This is a very common scan string that many people use to get initial recon done on assessments and, to […]
Learn MoreCreating a Simple Windows Domain for Offensive Testing: Part 4
By Red Siege | June 23, 2022
By: Justin Palk, Security Consultant This is part four of my series of blog posts on creating a windows domain for offensive security testing. In part 1, I stood up […]
Learn More