• Training
    • Overview
    • Schedule
    • Catalog
    • Training Reviews
    • Delivery Options
    • About Our Training
    • Exam Pass Guarantee
    • Student Funding
    • Alpine Security GSA Schedule
    • DoD 8570/8140 Approved Training
  • Services
    • Overview
    • Medical Device Cybersecurity
    • CISO-as-a-Service
    • Penetration Testing
    • DFARS and CMMC Compliance Audit
    • Breach Prevention Audit
    • Cybersecurity Risk Management Program
    • Enterprise Security Audit
    • Alpine Services Reviews
  • Blog
  • News
  • About Us
    • About Us
    • Meet The Team
    • Why Alpine?
  • Contact
CISO Global (formerly Alpine Security)CISO Global (formerly Alpine Security)
CISO Global (formerly Alpine Security)CISO Global (formerly Alpine Security)
  • Training
    • Overview
    • Schedule
    • Catalog
    • Training Reviews
    • Delivery Options
    • About Our Training
    • Exam Pass Guarantee
    • Student Funding
    • Alpine Security GSA Schedule
    • DoD 8570/8140 Approved Training
  • Services
    • Overview
    • Medical Device Cybersecurity
    • CISO-as-a-Service
    • Penetration Testing
    • DFARS and CMMC Compliance Audit
    • Breach Prevention Audit
    • Cybersecurity Risk Management Program
    • Enterprise Security Audit
    • Alpine Services Reviews
  • Blog
  • News
  • About Us
    • About Us
    • Meet The Team
    • Why Alpine?
  • Contact

Alpine Security Presents “Decoding the Hack” for Washington University’s Security Roundtable

Alpine Security Presents “Decoding the Hack” for Washington University’s Security Roundtable

 Alpine Security Discusses the Anatomy of Cyber Attacks

St. Louis, April 22, 2016 – Alpine Security Principal and White Hat Hacker, Christian Espinosa, spoke yesterday at the Security Roundtable meeting at Washington University in St. Louis. Christian’s presentation “Decoding the Hack” started with a review of the “state of affairs” in cyber security, covering common vulnerabilities and tactics such as social engineering, identifying and exploiting unpatched systems & applications, and quick malware delivery methods for unlocked systems. Christian briefly covered the optimal, and often neglected, Top 5 critical security controls, based on the Center for Internet Security’s (CIS) Foundational Cyber Hygiene.

A simple hacking methodology narrowed down to four steps was reviewed and used as a framework for hacking demonstrations. Hacking methodology:

  1. Objective Determination

  2. Reconnaissance

  3. Vulnerability Identification and Prioritization

  4. Exploitation

Live hacking demonstrations were broken into three broad categories – Physical Access Attacks, Client-Side Attacks, and Server-Side Attacks. The live hacking demonstration covered the following areas:

Physical Access Attacks

  • Physical reconnaissance and vulnerability identification

  • Keyboard HID device attack demonstration

  • Hardware keylogger attack demonstration

Client-Side Attacks

  • Target email reconnaissance and acquisition

  • Man-in-the-Middle attack demonstration

  • Phishing demonstration

  • Credential stealing demonstration

  • Browser exploit demonstration

Server-Side Attacks

  • Public-facing server reconnaissance

  • SQL server enumeration and vulnerability identification

  • SQL Injection attack demonstration

Attacks were broken down to include methods used, tools used, and defenses circumvented.

A copy of the presentation can be found HERE.

About Washington University Security Roundtable

The Technology & Leadership Center Security Roundtable offers a dynamic group setting with timely, in-demand subject matter and presenters who are industry experts in their fields.  Discussions include secure software, leveraging for threat assessment, cyber kill chain model implementation, STIK, TAXII and CybOX along with red team/blue team simulations.  Presented by a wide range of speakers such as Washington University faculty members, other leading universities, management consultants and industry experts from around the country.  The roundtables are designed to provide a collaborative environment for professionals across disciplines to share ideas and best practices on topics related to big data.

ABOUT ALPINE SECURITY

Alpine Security is a cyber security company that understands security is never a turnkey solution. Alpine Security takes a holistic approach, evaluating clients’ needs to develop a comprehensive solution with quantifiable results.  Alpine Security provides services covering every facet of computer and network security, ranging from full assessments to incident response to specialized cyber security training, such as malware analysis training.

Tags: HackingTop 20 Critical Security Controls
Share

You also might be interested in

armitage-meterpreter-options

7 Steps to Hack a Target with Virtually No Experience

Apr 24, 2016

Black Hat vs White Hat Hackers
A black hat hacker is fencing with a white hat hacker 3D illustration internet security concept

Black Hat vs White Hat Hackers

Mar 9, 2018

Do Script Kiddies Carry Out Most Cyber Attacks?
Boy With Glasses Using Laptop Computer While Sitting on Desk at Home. Studying Concept.

Do Script Kiddies Carry Out Most Cyber Attacks?

Mar 19, 2018

BLOG SEARCH:

Connect with Us

Interested in our cybersecurity training or services? Complete the form below and we’ll get back with you right away. We appreciate your interest.


Recent Posts

  • The State of Ransomware 2020
  • National Cybersecurity Awareness Month: 6 Things to Practice During the Month
  • Cybersecurity Checklist for Business Closures, Consolidations, and Acquisitions
  • What Is DevSecOps?
  • Cybersecurity and a Remote Workforce: What Does the Future Look Like?
  • 6 Penetration Testing Trends to Have on Your Cybersecurity Radar
  • Incorporating Privacy and Security by Design into MedTech
  • What is the Difference Between CMMC, DFARS, and NIST 800-171?
  • At Risk: Medical Device Cybersecurity Vulnerabilities Expose Patients to Life-threatening Consequences
  • 5 Reasons to Hire a Fractional CISO
  • Why Private Cybersecurity Training Matters for Your Organization
  • Is the CEH Certification Right For You?
  • Internal Penetration Test vs Vulnerability Assessment: Which is Right for You?
  • Best Beginner Cybersecurity Certification to Get
  • Penetration Testing for Compliance: The Top 5 Laws and Regulations that Require Testing

Alpine Security is a member of the CISO Global family of companies.

Contact Us:

  • CISO Global
  • 6900 E. Camelback Road, Suite 900 Scottsdale, AZ 85251
  • 480-389-3444
  • info@ciso.inc
  • www.ciso.inc

Get Info

About Our Training
About Our Services
Meet the Team
Blog
Terms of Use
Privacy Policy

Join The Community

  • Facebook
  • LinkedIn
  • Twitter
  • YouTube
  • Mail

Proud Partners

© 2021 · Alpine Security, a Cerberus Sentinel Company