How a Hacker Attacks their Target – Part II
14/05/2019
KPMG Tauranga Office | 247 Cameron Road - Level 2, Tauranga, Bay of Plenty
Agenda
12:00-12:15 | Arrivals & Networking |
12:15-12:30 | Welcome and Cyber Security News Update, Jon Edney [CISSP, CEH,CIPT] |
12:30-13:30 | How a Hacker Attacks their Target – Part II, Win Amann, Certified Ethical Hacker, Pro.Security |
13:30-13:45 | Networking |
Summary
- Man-in-the-Middle-Attack made easy
- DNS Server Hijacking
- How Wi-Fi attacks work
- Is your router an open door?
- Fileless Malware (“Living off the Land Attacks”)
Presenter Profile
Win Amann is a cybersecurity consultant and a Certified Ethical Hacker (CEH) with 20+ years of experience in different fields of IT (network administration, programming). Winfried’s focus is vulnerability assessment and implementing effective security controls that will reduce your attack surface significantly.