What is Tradecraft Tuesday?Every Tuesday at 12pm ET,
Chris Bisnett and
Kyle Hanslovan expose the techniques used by hackers. With their 20 combined years in offensive cyber security and digital forensics, Chris and Kyle cover a new topic each week in a
LIVE video chat. These unrehearsed conversations allow anyone to learn, ask questions, and share their experiences from offensive and defensive perspectives. In case you miss an episode, each recorded session are uploaded to Cybrary's new
CH4NN3L platform.
This Week's Episode
We’re exposing how a hacker exploited a flaw to steal over $60M USD of digital currency called Ethereum. We’ll start with an overview on Ethereum, it’s use of “smart contracts”, and The DAO (the compromised organization). Next we’ll dive deep into the actual code used by the attacker to carry out the heist. Lastly, we’ll discuss the non-technical tradecraft the hacker is leveraging to prevent the Ethereum community from blacklisting his stolen currency from the ever hitting the market.
[tradecraft_badge]

Check out your profile to see your new badge :)
Chris BisnettChris Bisnett is a veteran information security researcher with more than a decade of experience in offensive and defensive cyber operations. While serving with the NSA RedTeam, he attacked government networks and systems to identify and remedy vulnerabilities. He is also a recognized Black Hat conference trainer and has taught his “
Fuzzing For Vulnerabilities” course at several events around the world. Prior to founding
Huntress Labs, Mr. Bisnett co-founded LegalConfirm, LLC where he led product design and development until the company was acquired in 2014.
Kyle HanslovanFor the past 10 years, Kyle Hanslovan has supported defensive and offensive cyber operations in the U.S. Intelligence Community and currently is the CEO of
Huntress Labs. He previously co-founded the defense consulting firm
StrategicIO and actively participates in the ethical hacking community as a
Black Hat conference trainer, STEM mentor, and Def Con CTF champion. Additionally, he serves in the Maryland Air National Guard as a Cyber Warfare Operator. With his strong background in technical leadership, software development, and malware analysis, Mr. Hanslovan seeks to significantly raise the bar for malicious actors to successfully conduct cyber attacks.