| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
A dedicated attacker does not have time limitations when attempting to find
vulnerabilities in a target. As a penetration tester, you are bound by certain
restrictions, including scope, attack methods, and time/date restrictions.
Because of these restrictions, it’s helpful to prioritize certain targets over
others to increase your chances of breaking in. This talk will cover scenarios,
which raise red flags for us, why, and how to develop your own sense of
intuition. Dan Crowley / Chris Vinecombe Daniel Crowley – Daniel (aka “unicornFurnace”) is an Application Security
Consultant for Trustwave’s SpiderLabs team. He has been working in the
information security industry for over 7 years and has been focused on
penetration testing, specifically on Web applications. Daniel denies all
allegations regarding unicorn smuggling and questions your character for even
suggesting it. Daniel has developed configurable testbeds such as SQLol and
XMLmao for training and research regarding specific vulnerabilities. Daniel
enjoys climbing large rocks. Daniel is a frequent speaker at conferences
including DEFCON, Shmoocon, and SOURCE. Daniel does his own charcuterie.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast