Your Instructor:

Paul Mooney
(Blue Wave Group, UK)

“How secure is your Domino
environment, what countermeasures can you take against hackers.”

This one day workshop is instructor led, offering full walkthroughs and demonstrations of measures and countermeasures to protect your Domino environment from hackers.
Paul Mooney is a Senior Domino consultant with 20 years experience. He is named a collaboration Champion by IBM.

All Seats are taken. Sorry for this!

Date, Duration and location
Wednesday, March 20th, 2013
From 9:30 to 4:30pm
Lunch included.
Location: Faculty Club in Leuven. (same location as the BLUG event itself)

Summary Description
This 1 day presentation is aimed at introducing Domino administrators to the world of reconnaissance, vulnerability scanning, disruption and compromise of servers, with a heavy slant towards Lotus Domino. By the end of the day, the administrators will be armed with knowledge and tools to increase the security of their domino web infrastructure.

The target audience for this session are Domino administrators with network infrastructure knowledge.

450 EUR for the full day, including sandwich lunch.
A second person of the same company can join for 350 EUR.
Important: Registration closes 2 weeks before the workshop.
You will get notified and invoiced as soon as we reach 8 people.
If the number of registrations is less than 8, the workshop will be cancelled, and you will be notified too.
A maximum of 16 people are allowed. We work on a first come, first serve basis.

  • Introduction
    • Day Overview
    • Objectives
    • Terminology
  • Reconnaissance
    • Discovering Data Discretely
    • What Do Hackers Look for
    • Why Patch Servers?
  • Scanning
    • Anonymising your Identity
    • Anonymous Proxies
    • Public IP Ranges
    • Obtaining Information about the Domino Server
    • Searching for Weaknesses
    • Sniffing Data
    • Countermeasures
  • Disruption
    • Disrupting Service
    • DOS Attack
    • DDOS Attack
    • Countermeasures
  • Social Engineering

  • Penetration Testing
    • Exploitation
    • Countermeasures