Dave von Fintel

Filmmaker/Photographer specializing in Aerial Cinematography


  • Filmmaker specializing in Aerial Cinematography2014 - Present

    Kansas City, MO

    I'm taking my creative skills to new heights - piloting a UAV to produce dramatic aerial video/photo solutions as well as producing & editing conventional video for a variety of industries.

  • Freelance Creative Director2012 - 2014


  • Web Development Director2004 - 2012

    Rockhurst University

  • Creative Director1999 - 2004

    Rockhurst University

  • Art Director1998 - 1999

    Rockhurst University

  • Graphic Designer1997 - 1998

    GB Design


  • Bachelor of Fine Arts (BFA), Graphic Design1991 - 1996

    University of Missouri

  • Graphic Design, Photography & Video Production1995 - 1996

    University of Tasmania School of Art, Australia


  • “Dave has exceptional skills as a designer and web developer. As his supervisor for several years, I found him to be a joy to work with, and a great team player. He is a problem-solver who finds a solution to every challenge. I would not hesitate to hire him again.”

    Rosita McCoy, Senior VP - KU Endowment Association

  • “I’ve had the pleasure of working with Dave on many projects. He’s always able to bring a fresh perspective to every job. His positive personality and openness to trying new things, makes working with him a very fun & collaborative event.”

    Mark McDonald, Owner - Mark McDonald Photography

  • “I worked with Dave for several years while employed at gb Design. Dave and I collaborated on a variety of design projects and I always found him to be easy to work with and valued the ideas and professionalism he brought to the table. Since that time, my agency has had the pleasure to work with Dave and his team at Rockhurst as a vendor providing online development solutions and consulting to Rockhurst University. Dave continues to provide impressive direction and management skills to the projects we have conducted with him and his team.”

    Ryan Lorei, Owner - Voltage Creative

  • “In the seven years Dave and I worked together, I watched him consistently come up with effective, creative solutions for various print, web and video projects. He stays on top of design trends and web standards, and everything he touches looks refined and professional. He has exceptional talent and lots of ideas, which made him a valuable member of our team.”

    Jamie Swearingen, UX Copywriter - Garmin International

  • “I have hired Dave may times for his expert graphic design services, and have also brought him in as a consultant on several high profile web design and development projects. Dave's ability to listen to my client's needs, and his ability to translate their ideas into reality are second to none.”

    Matt Couch, Real Estate Analyst - Hopkins Appraisal Services


  • • CASE (Council for Advancement and Support of Education): Silver Award
- '09, Excellence in Multimedia: Single Web Page (Ready for Rockhurst) 
- Bronze - '02, Rockhurst University Alumni Magazine 
- Silver - '01, Rockhurst University Alumni Magazine
 - Gold - '00, Rockhurst University Alumni Magazine Cover 
- Silver - '00, Rockhurst University Campus Banners 
• Web Marketing Association's Web Awards Judge - '08 
• JAA (Jesuit Advancement Administrators): '06 - Award of Merit: Multimedia, Admission Pages 
• Internet Advertising Competition '05 - Best Education Integrated Ad Campaign - Rockhurst Website 
• Center for Digital Education: '05 Best of the Web 2nd place, Rockhurst University 
• Web Marketing Association: '05 Best Education Internet Advertising Award, Rockhurst University 
• American Association of Webmasters: '04 Silver Award, Rockhurst University 
• Mead Papers: Certificate of Excellence in the Graphic Arts - Rockhurst University, 1999 Annual Report

Visit Instagram/davevonfintel for frequently updated shots. Some of my work features footage that may be purchased as stock video or photo.


Let's Connect

Kevin Mitnick is KnowBe4’s Main Hacking Officer

As soon as the guy posted a quick YouTube video clip revealing your hacking their way through multi-factor verification (MFA), the advertising and marketing and PR department have blown up with inquiries, telephone calls, and meeting demands.

“During that time, most of my pals in information protection actually considered MFA was actually difficult hack,” Grimes says. “I am able to hack any MFA answer at the least five or six different ways. And right now I’m composing my personal most recent book on the subject, and it also appears like i will be able to document close to 50 strategies to beat MFA.”

Defining multi-factor authentication (MFA)

Grimes directed the SecureWorld internet meeting 12 approaches to beat Multi-Factor verification, and ways to end the criminals, you’ll find on-demand.

These might be through things understand (like a password or PIN), things you has (like a USB token), one thing you may be (biometrics), and other aspects (like product location verification). States Grimes:

“if you like MFA is strong, you must need different types of issue. Like a PIN and a sple. It’s hard for an assailant to phish your own PIN and get your actual se energy. That increase their safety.”

MFA assaults, methods that work

From the highest stage, Grimes claims hackers make use of a few methods. Personal manufacturing is vital, you’ll find technical problems against root technologies, and real assaults like biometric thieves, for example.

And some of this assaults involve a couple of means and are assisted by vulnerable transitioning between linked steps, like identification, verification, and authorization.

Defeating multi-factor verification in a Network program Hijack

Grimes begun by analyzing exactly what the guy calls a “quite simple” attack, which Kevin Mitnick exhibited after Grimes outlined it.

The MFA approach is called Network period Hijacking, and Grimes says scores of records being compromised within types of combat.

“really probably the most common types of hacking to obtain around multi- factor authentication. They normally need a man-in-the-middle assault. So there has to be an attack with this somehow. In the middle the customer therefore the machine, the attacker leaves them within this genuine marketing and sales communications stress. Then the attacker delays when it comes to standard individual to authenticate. Right after which they pour the legitimate ensuing access controls token.

Therefore usually just what attacker will do, try a man-in-the-middle session, right after which they are going to put a bad proxy websites in the center of that, that neither your client or the host knows about.

And they’re going to proxy the internet site with the consumer and every little thing the consumer types or clicks on the site, after which pour all the details involving the two waiting for that verification to be successful.

They do not worry whether you authenticate your own login term and code or multi-factor or a 10-factor option. They can be just waiting around for that access control token receive jeopardized.”

Throughout online seminar, Kevin Mitnick after that done this type of fight, and sure enough, it absolutely was easy and simply got a few momemts.

Other types of MFA assaults intricate

Grimes then continued his speech, addressing over twelve different MFA problems that actually work, like real-world samples of in which assailants have tried them.

  • Man-in-the-endpoint problems
  • SIM changing attacks
  • SMS-based MFA assaults
  • Replicate Rule Generator Attacks
  • Account/password healing problems
  • Hijacking Shared Auth & APIs
Protecting against MFA assaults

If problems on MFA tend to be effortless so there are so many ones, really does MFA add up? Roger Grimes nonetheless believes it does.

“I don’t should say multi-factor is awful. With that said, truly usually a lot better than single-factor therefore we should make an effort to utilize it anywhere it makes sense and it is feasible. However, if someone tells you some thing is unhackable, they are possibly sleeping for you or dumb.”

In the case of MFA, Grimes states top security methods add degree both for admins and end-users. This should consist of MFA hacking awareness in the security consciousness training.

We consider you will find this cybersecurity online conference to get chemistry profiles excessively helpful and useful in the effort to guard your organization.