Smashing The Stack For Profit - Period presented at HITBSecConf Malaysia 2006

by Rohyt Belani,

Tags: Security Wireless

Summary : Presentation Title:Presentation Details:Attacks that I have responded to in the recent past have rarely been conducted for fun. The monetary motivation of the hackers is obvious. In this presentation I will discuss real world attacks that entailed a deadly combination of financial fraud and computer crime. The case studies will discuss how the white collared criminals (financial wizards) operate in tandem with computer hackers to rake in the moolah! The focus of the presentation will be on the techniques used by the hackers to obtain the information necessary to successfully execute such attacks.Note:Not for the faint-hearted!About RohytRohyt Belani is a Director with Mandiant. His expertise encompasses the areas of wireless security, application security and incident response. Rohyt is also an experienced and talented instructor of technical security education courses. Prior to joining Mandiant, Mr. Belani was a Principal Consultant at Foundstone. Earlier in his career, he was a Research Group Member for the Networked Systems Survivability Group at the Computer Emergency Response Team (CERT).Mr. Belani is a frequent author of articles for SecurityFocus, a reputed information security portal and SC magazine. He is also a contributing author for the Osborne publication, Hack Notes xe2u20acu201c Network Security and the Addison-Wesley publication, Extrusion Detection: Security Monitoring for Internal Intrusions. Rohyt is a regular speaker at various industry conferences and forums like OWASP, HTCIA, FBI-Cyber Security Summit, New York State Cyber Security Conference and HITBSecConf2005 - Malaysia. Additionally, he has presented at several Institute of Electrical and Electronics Engineers (IEEE) and Association for Computing Machinery (ACM) -sponsored conferences.Mr. Belani holds a Bachelor of Engineering in Computer Engineering from Bombay University and a Master of Science in Information Networking from Carnegie Mellon University. He is a Certified Information Systems Security Professional (CISSP).