Hacking Dumber Redux: More Dumberer
Tim Medin to Speak at Wild West Hacking Fest San Diego
Red Siege Principal Consultant Tim Medin will present at 4pm Wednesday, March 11 at the Wild West Hackin’ Fest – Way West in San Diego, California.
In Medin’s presentation “Hacking Dumberly Redux: More Dumberer” he will discuss the dumbest red team tricks and hacks encountered over the years.
“We are going to take the A out of APT (again), because so few attackers really need to use advanced techniques,” Medin said. “We’ll also discuss the simple defenses that make an attacker’s life much more difficult.”
In addition to his expert instruction, Medin will be bringing a new Red Siege shirt to giveaway and will have a challenge/puzzle for attendees to attempt for commemorative coins.
“We were delighted to be invited to the Wild West Hackin’ Fest – Way West. Every time we present we want those in the audience to have immediate, applicable insights to implement and to have a great time,” Medin said. “At the end of the day, we are all on the same side, trying to stop the bad guys before they break in and cause harm. We are always happy to share what we have learned through our work at Red Siege.”
Wild West Hackin’ Fest – Way West will be held from March 10 – 13 in San Diego, California with an associated two day training on March 10 and 11.
Linked In: https://www.linkedin.com/in/TimMedin
Tim Medin is the founder and Principal Consultant at Red Siege. Tim is also a Principal SANS Instructor, the SANS MSISE Program Director and a SANS course author. Through the course of his career, Tim has performed penetration tests on a wide range of organizations and technologies. He gained information security experience in a variety of industries including previous positions in control systems, higher education, financial services, and manufacturing. Tim is an experienced international speaker, having presented to organizations around the world. Tim the creator of the Kerberoasting, a technique to extract kerberos tickets in order to offline attack the password of enterprise service accounts. Tim earned his MBA through the University of Texas. Tim holds the GWAPT, GPEN, GMOB, GCED, and GCIH certifications and he previously held the CCNA certification.
Related StoriesView More
Attacking SAML implementations
By Red Siege | November 2, 2021
SAML and SAML Attacks Recently a client mentioned that they wanted me to pay particular attention to the SAML authentication on an app I was going to be testing. It’s […]Learn More
Bypassing Signature-Based AV
By Red Siege | August 25, 2021
If you want to execute arbitrary code on an endpoint during a penetration test, red team, or assumed breach, chances are you’ll have to evade some kind of antivirus solution. […]Learn More
Sans Core Netwars Tournament of Champions Europe
By Red Siege | August 9, 2021
From Justin Palk, Security Consultant: I’ll be honest, it feels good to win. Popping a shell sends a shiver down my spine. But getting into a duel with another team […]Learn More