Help Irongeek.com pay for bandwidth and research equipment:
Social Engineering Applied: Exploit the Target Hack3rcon 3 (Hacking Illustrated Series InfoSec Tutorial Videos)
Social Engineering Applied: Exploit the Target
Hack3rcon 3
While we all love being able to just roll in, pop some boxes and walk
away with the hashes then call it a day; This type of mindset doesn't
bring return customers. In this presentation we'll be discussing some
of the common issues with managing technical assessments to ensure
that the customers we hack today will call us back again in the future
to hack them again.
Keith Pachulski
Keith Pachulski is a Security Consultant based out of Northeast Pennsylvania
with over 16 years of experience in the Information Security and Physical
Security industries specializing in Penetration Testing, Vulnerability
Assessment, Risk Assessments & Compliance for the private and public sectors.
Prior to consulting, he was the CSO for a medium sized company in Pennsylvania
as well as creating and managing a Managed Security Services Team servicing the
northeast PA area. He recently started the NorthEast PA Information Security
Group http://groups.google.com/group/nepa-infosec-group