SlideShare a Scribd company logo
  • Upload
  • Home
  • Explore
  • Login
  • Signup
SlideShare a Scribd company logo
  • Home
  • Explore
  • Upload
  • Login
  • Signup

We've updated our privacy policy. Click here to review the details. Tap here to review the details.

×
×
×
×
×
×
Tom Eston

Tom Eston

127 Followers
19 SlideShares 0 Clipboards 127 Followers 136 Followings
  • Unblock User Block User
19 SlideShares 0 Clipboards 127 Followers 136 Followings

Personal Information
Organization / Workplace
Cleveland United States
Occupation
Manager, Attack & Defense Team
Industry
Technology / Software / Internet
Website
spylogic.net
About
I focus much of my research on new and emerging technologies such as social media, advanced web application technologies and mobile device/application assessments. My research also includes developing and improving penetration testing methodologies and aligning them to industry standards. I frequently speak about my research at various user groups, businesses and national conferences including SANS, OWASP AppSec, ShmooCon, DEFCON, Black Hat USA, Black Hat Abu Dhabi, InfoSec World, Notacon, DerbyCon and ISSA summits.
Contact Details
Tags
pentest hacking security penetrationtesting facebook myspace twitter socnetsec socialmedia framework mobile zombies socialnetworking bots metasploit apple ios bot maltego informationgathering cyberbullying cyberstalking socnet physicalsecurity webapp coreimpact google android mobile phone mobile computing owasp privacy defcon linkedin kreiosc2 botnet external tigerteam awareness threats social media technology money microsoft fraud finance accounting microsoft dynamics derbycon socialnetworks duckface byod infosec informationsecurity casino smartphones mobile application development blackhat penetration test web service webapplication oracle glassfish webservices samurai-wtf soap ipad2 iphone executive jailbreaking ipad notacon gps geotag wireless locations lbs geolocation wifi malware botnets brains trust socialnetworks socialmedia api shmoocon yahoopipes rss speaking googledorks blog spam media secure socialbutterfly ettercap cain sslstrip wireshark fon middler mitm methodology
See more
Presentations (19)
See all
Online Social Networks: 5 threats and 5 ways to use them safely
14 years ago • 8301 Views
Physical Security Assessments
14 years ago • 18452 Views
Automated Penetration Testing With The Metasploit Framework
14 years ago • 5792 Views
Automated Penetration Testing With Core Impact
14 years ago • 3256 Views
Information Gathering With Maltego
14 years ago • 7018 Views
Rise of the Autobots: Into the Underground of Social Network Bots
14 years ago • 3061 Views
New School Man-in-the-Middle
14 years ago • 2576 Views
Staying Safe & Secure on Twitter
13 years ago • 1934 Views
Enterprise Open Source Intelligence Gathering
13 years ago • 28025 Views
Social Zombies II: Your Friends Need More Brains
13 years ago • 9529 Views
Social Zombies Gone Wild: Totally Exposed and Uncensored
12 years ago • 4798 Views
Attacking and Defending Apple iOS Devices
12 years ago • 9344 Views
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
11 years ago • 5580 Views
Smart Bombs: Mobile Vulnerability and Exploitation
11 years ago • 13040 Views
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetration Tester & Other Stories
11 years ago • 5111 Views
The Android vs. Apple iOS Security Showdown
10 years ago • 33266 Views
Social Zombies: Rise of the Mobile Dead
10 years ago • 3561 Views
Cash is King: Who's Wearing Your Crown?
9 years ago • 3504 Views
Privacy Exposed: Ramifications of Social Media and Mobile Technology
9 years ago • 3307 Views
Likes (5)
See all
EkoParty 2010: iPhone Rootkit? There's an App for that.
Eric Monti • 12 years ago
Pentesting Mobile Applications (Prashant Verma)
ClubHack • 11 years ago
Smart Phones Dumb Apps
Denim Group • 12 years ago
Using Proxies To Secure Applications And More
Josh Sokol • 14 years ago
Twitter Bots
Neil Crosby • 15 years ago
  • Activity
  • About

Presentations (19)
See all
Online Social Networks: 5 threats and 5 ways to use them safely
14 years ago • 8301 Views
Physical Security Assessments
14 years ago • 18452 Views
Automated Penetration Testing With The Metasploit Framework
14 years ago • 5792 Views
Automated Penetration Testing With Core Impact
14 years ago • 3256 Views
Information Gathering With Maltego
14 years ago • 7018 Views
Rise of the Autobots: Into the Underground of Social Network Bots
14 years ago • 3061 Views
New School Man-in-the-Middle
14 years ago • 2576 Views
Staying Safe & Secure on Twitter
13 years ago • 1934 Views
Enterprise Open Source Intelligence Gathering
13 years ago • 28025 Views
Social Zombies II: Your Friends Need More Brains
13 years ago • 9529 Views
Social Zombies Gone Wild: Totally Exposed and Uncensored
12 years ago • 4798 Views
Attacking and Defending Apple iOS Devices
12 years ago • 9344 Views
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
11 years ago • 5580 Views
Smart Bombs: Mobile Vulnerability and Exploitation
11 years ago • 13040 Views
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetration Tester & Other Stories
11 years ago • 5111 Views
The Android vs. Apple iOS Security Showdown
10 years ago • 33266 Views
Social Zombies: Rise of the Mobile Dead
10 years ago • 3561 Views
Cash is King: Who's Wearing Your Crown?
9 years ago • 3504 Views
Privacy Exposed: Ramifications of Social Media and Mobile Technology
9 years ago • 3307 Views
Likes (5)
See all
EkoParty 2010: iPhone Rootkit? There's an App for that.
Eric Monti • 12 years ago
Pentesting Mobile Applications (Prashant Verma)
ClubHack • 11 years ago
Smart Phones Dumb Apps
Denim Group • 12 years ago
Using Proxies To Secure Applications And More
Josh Sokol • 14 years ago
Twitter Bots
Neil Crosby • 15 years ago
Personal Information
Organization / Workplace
Cleveland United States
Occupation
Manager, Attack & Defense Team
Industry
Technology / Software / Internet
Website
spylogic.net
About
I focus much of my research on new and emerging technologies such as social media, advanced web application technologies and mobile device/application assessments. My research also includes developing and improving penetration testing methodologies and aligning them to industry standards. I frequently speak about my research at various user groups, businesses and national conferences including SANS, OWASP AppSec, ShmooCon, DEFCON, Black Hat USA, Black Hat Abu Dhabi, InfoSec World, Notacon, DerbyCon and ISSA summits.
Tags
pentest hacking security penetrationtesting facebook myspace twitter socnetsec socialmedia framework mobile zombies socialnetworking bots metasploit apple ios bot maltego informationgathering cyberbullying cyberstalking socnet physicalsecurity webapp coreimpact google android mobile phone mobile computing owasp privacy defcon linkedin kreiosc2 botnet external tigerteam awareness threats social media technology money microsoft fraud finance accounting microsoft dynamics derbycon socialnetworks duckface byod infosec informationsecurity casino smartphones mobile application development blackhat penetration test web service webapplication oracle glassfish webservices samurai-wtf soap ipad2 iphone executive jailbreaking ipad notacon gps geotag wireless locations lbs geolocation wifi malware botnets brains trust socialnetworks socialmedia api shmoocon yahoopipes rss speaking googledorks blog spam media secure socialbutterfly ettercap cain sslstrip wireshark fon middler mitm methodology
See more

Modal header

  • About
  • Support
  • Terms
  • Privacy
  • Copyright
  • Cookie Preferences
  • Do not sell or share my personal information
English
Current Language: English
Español
Português
Français
Deutsch

© 2023 SlideShare from Scribd

We've updated our privacy policy.

We’ve updated our privacy policy so that we are compliant with changing global privacy regulations and to provide you with insight into the limited ways in which we use your data.

You can read the details below. By accepting, you agree to the updated privacy policy.

Thank you!

View updated privacy policy
We've encountered a problem, please try again.