We (Could Have) Cracked Open the Network for Under $100


Posted on in Presentations

Exploiting a vulnerability or spearphishing for credentials is hard work. But, someone can easily purchase them on the sprawling secondary hardware market. Presenters in this session tested the hypothesis that decommissioning processes may not wipe a device clean, leaving critical data from the previous owner accessible and open to abuse. Come hear what was accessed and the potential damage it could cause.


Participants
Tony Anscombe

Speaker

Chief Security Evangelist, ESET

Cameron Camp

Speaker

Specialized Security Researcher, ESET


Share With Your Community