| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
Godamitsomuch. How did printing a report from a vuln scanner qualify as a “pen test”? Why are your testers ignoring low
and informational findings?
In this presentation, John will cover some key components
that many penetration tests lack, including why it is important to get caught, why it is important to learn from real
attackers and how to gain access to organizations without
sending a single exploit, and how to look for other attackers
on the network. Additionally, John will show you how to bypass
“all powerful” white listing applications that are often touted
as an impenetrable defense.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast