<p>In recent news stories. we've been presented with the arrests of several individuals whom have been arrested for stealing identities that they allegedly acquired over P2P networks. Combine this with corporate data leakage via P2P networks, we put on our thinking caps and tried to see how hard it really was. What we found was astounding. We'll share with you our methodologies for evil searches, tools and the results of our findings with real worked examples. We'll show you how to add P2P into your information gathering and reckon program, as well as a tool for detecting information leakage in your organizations.</p>
<p>A hardware hacker and penetration tester, Larry Pesce is also a Security Evangelist and co-host for the PaulDotCom Security Weekly podcast at www.pauldotcom.com. Larry is also an author with Syngress publishing.</p>
<p>Mick Douglas enjoys and actively participates in penetration testing, his true passion is defense -- tweaking existing networks, systems, and applications to keep the bad guys out. In addition to his technical work, Mick jumps at every chance to participate in a social engineering engagement. </p>