| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
What can you do to step up your game as a security analyst?
Vulnerability scanners and other security assessment tools
can be extremely useful for collecting information quickly and
efficiently, but what are some good next steps for analyzing
and using that information? How much value does a raw
vulnerability scan report provide (hint: don’t just hand this
to a client or supervisor), and how much more value can we
get out of our tools with a little bit of effort? What do you
do when you need data that an existing tool can’t provide?
John will discuss some areas in the security asssessment
process that are ripe for easy wins through custom scripting, including data aggregation, diffing, false,positive identification, and visualization. As an example, John will release a
tool for slicing and dicing the results from assessment tools
in interesting ways, based on various techniques used in
previous consulting engagements.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast