miércoles, 27 de agosto de 2008

Core Security's "Pen Testing Ninjitsu" webcast series

---------------------------------------------------------------------------------------
Pen Testing Ninjitsu Part I – “Windows Command Line Hero”
---------------------------------------------------------------------------------------
A brief introduction to the value of penetration testing + an overview of pen testing techniques using the Windows command shell.
* Presentation
* Slide deck

---------------------------------------------------------------------------------------
Pen Testing Ninjitsu Part II – “Crouching Netcat, Hidden Vulnerabilities”
---------------------------------------------------------------------------------------
An introduction to techniques for performing the functions of Netcat - such as moving files, scanning ports and creating backdoors - without using Netcat.
* Presentation
* Slide deck


---------------------------------------------------------------------------------------
Pen Testing Ninjitsu Part III – “After the Initial Compromise”
---------------------------------------------------------------------------------------
This installment explores what can happen after the initial vulnerability is compromised and a threat becomes truly invasive – and how to proactively assess your systems against such attacks. This installment will explore what can happen after the initial vulnerability is compromised and a threat becomes truly invasive – and how to proactively assess your systems against such attacks.
* Presentation
* Slide deck

Core Security Technologies

No hay comentarios: