Hack Red Con 2024
-
Doors, Cameras, and Mantraps: Oh, my!
Dylan "The Magician" Baklor
-
End the Burnout - 3 things your CISO wishes you knew.
Mark Thacker
-
Registration Opens
Oct. 25
-
Opening Ceremony
Oct. 25
-
Keynote Round Table - Ed Skoudis, Dave Kennedy, Ken Nevers, Amanda Berlin
Oct. 25
-
Intro to Infrastructure Automation for Offensive Security
Alex MartirosyanOct. 25
-
Securing Derby 150
Jason PaytonOct. 25
-
Creating Intelligence From Malware Samples
Jon "Wally" Prather and Jeff SmealOct. 25
-
CISO Roundtable
Oct. 25
-
Reframing the “Success” of an Offensive Test: Taking a Risk-Based Approach
Celina StewartOct. 25
Erich Jackson works as a Lead Information Security Analyst, has many years of application development and project management experience, and has presented at the Louisville ISSA, UofL, DRI Trucking Law Conference, and Code PaLOUsa. Erich also maintains an open source library and holds a patent in the area of automatic foreign language translation. Erich has earned a GXPN, GWAPT, GPEN, GCSA, and GCIH from SANS and a BA in Psychology from University of Louisville.
We use RFID nearly every day without knowing it: toys, labels, access cards, and even to a limited extent credit cards. Over the years, hackers have devised clever equipment to clone and create RFID. The problem for security practitioners is that it is often hard to find information on how RFID works – or even where to start. Though obscurity may thwart some attacks, lack of knowledge leads to real problems. In this talk, we will “ungatekeep” RFID knowledge by diving into how RFID works, how it can be hacked, and how you can secure your own assets.