To the low hanging fruit of the hacker community, the script kiddies, operational security (OpSec, for short) is a foreign concept. Common sociological factors contribute to the growth of this “sect”. Tracking and identifying these individuals by the trails they leave is considered, by some, to be an art form in and of itself. From the rudimentary protections put in place to protect their servers, to the cross contamination of online personas, we will provide the audience an “over the shoulder” view of the process of scoping, tracking, and identifying individual actors.
“Allison Nixon does penetration testing and incident response, either assisting companies in post-compromise situation, or compromising them. She is intensely interested in all facets of security and continues to perform security research spanning any and all topics. Allison is a regular host on the Pauldotcom podcast, has spoken at B-Sides Boston 2013, local OWASP meetings, and sits on the executive board of MalShare. She also designed the electronics and software for the laser maze at the 2012 Braintank conference.
Brandon Levene is an incident handler for a large cloud provider. He is interested in malware analysis, security intelligence and the profiling of threat actors. He has spoken at The Brain Tank (2012, RI), BSides Boston 2013, and BSides RI 2013. Brandon has contributed research to multiple articles on Krebsonsecurity.com. He also sits on the executive board for MalShare.”