Log in

goodpods headphones icon

To access all our features

Open the Goodpods app
Close icon
Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference. - AugustPaes de Barros: New Botnets Trends and Threats

AugustPaes de Barros: New Botnets Trends and Threats

01/09/06 • 50 min

Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference.
"The last years have seen the growth of botnets and its transformation inta highly profitable business. Most of the botnets seen until now have used the same basic concepts. This presentation intends tshow what are the major challenges faced by botnet authors and what they might try in the future tsolve them. The presentation will pass through some interesting solutions for botnet design challenges. A layered and extensible approach for Bots will be presented, showing that solutions from exploit construction (like metasploit), P2P networks (Gnutella and Skype), authentication (digital signatures) and covert channels research fields can be used tmake botnets more reliable, extensible and hard tput down."
"Augustworks with Information Security since 2000. He worked for security consulting companies, Moduland Proteus, as security analyst and project manager. Augustalsworked in BankBoston, a Bank of America branch, as security manager, and now works as CSin a Credit Card processing company.
In 2003, coined the term honeytoken during a discussion with other researchers on the focus-ids mailing list. In his last research, Augustbuilt a Proof of Concept Trojan horse that works against the most recent security measures from Brazilian online banks, presented at the CNASI Conference in 2005. He is an active blogger (http://www.paesdebarros.com.br/indexpb.html).
Current president of the Brazilian ISSA Chapter, he alsgives Criptography and Ethical Hacking classes tthe post-graduation courses from IBTA University. He is finishing his Master in Computer Engineering at the Technology Research Institute (Institutde Pesquisas Tecnologicas de SoPaulo), working on a methodology for internal threats detection."
plus icon
bookmark
"The last years have seen the growth of botnets and its transformation inta highly profitable business. Most of the botnets seen until now have used the same basic concepts. This presentation intends tshow what are the major challenges faced by botnet authors and what they might try in the future tsolve them. The presentation will pass through some interesting solutions for botnet design challenges. A layered and extensible approach for Bots will be presented, showing that solutions from exploit construction (like metasploit), P2P networks (Gnutella and Skype), authentication (digital signatures) and covert channels research fields can be used tmake botnets more reliable, extensible and hard tput down."
"Augustworks with Information Security since 2000. He worked for security consulting companies, Moduland Proteus, as security analyst and project manager. Augustalsworked in BankBoston, a Bank of America branch, as security manager, and now works as CSin a Credit Card processing company.
In 2003, coined the term honeytoken during a discussion with other researchers on the focus-ids mailing list. In his last research, Augustbuilt a Proof of Concept Trojan horse that works against the most recent security measures from Brazilian online banks, presented at the CNASI Conference in 2005. He is an active blogger (http://www.paesdebarros.com.br/indexpb.html).
Current president of the Brazilian ISSA Chapter, he alsgives Criptography and Ethical Hacking classes tthe post-graduation courses from IBTA University. He is finishing his Master in Computer Engineering at the Technology Research Institute (Institutde Pesquisas Tecnologicas de SoPaulo), working on a methodology for internal threats detection."

Next Episode

undefined - Jeff Moss and Roger Cumming: Welcome and Keynote.

Jeff Moss and Roger Cumming: Welcome and Keynote.


Jeff Moss introduces the Keynote and welcomes everyone tthe Amsterdam 2007 conference!
Roger will provide an overview of the work of CPNI in reducing vulnerability in information systems that form part of the UK. He will then challenge the community on a number of issues, including the development of the malicious market place, and the role security researchers in addressing vulnerabilities as used by a range of threat actors.
Until 31 January 2007 Roger Cumming was Director of the National Infrastructure Security Co-ordination Centre (NISCC), the UK centre responsible for minimising the impact of electronic attack on the UK critical national infrastructure. Since 1 February Roger has been Head of Advice Delivery and Knowledge Development at the UK Centre for the Protection of National Infrastructure (CPNI). CPNI provides protective security advice on information security as well as physical and personnel security treduce the vulnerability of the UK's national infrastructure tterrorism and other threats.

Episode Comments

Generate a badge

Get a badge for your website that links back to this episode

Select type & size
Open dropdown icon
share badge image

<a href="https://goodpods.com/podcasts/black-hat-briefings-europe-2007-audio-presentations-from-the-security-48991/augustpaes-de-barros-new-botnets-trends-and-threats-2438130"> <img src="https://storage.googleapis.com/goodpods-images-bucket/badges/generic-badge-1.svg" alt="listen to augustpaes de barros: new botnets trends and threats on goodpods" style="width: 225px" /> </a>

Copy