---------------------------------------------------------------------------------------
Pen Testing Ninjitsu Part I – “Windows Command Line Hero”
---------------------------------------------------------------------------------------
A brief introduction to the value of penetration testing + an overview of pen testing techniques using the Windows command shell.
* Presentation
* Slide deck
---------------------------------------------------------------------------------------
Pen Testing Ninjitsu Part II – “Crouching Netcat, Hidden Vulnerabilities”
---------------------------------------------------------------------------------------
An introduction to techniques for performing the functions of Netcat - such as moving files, scanning ports and creating backdoors - without using Netcat.
* Presentation
* Slide deck
---------------------------------------------------------------------------------------
Pen Testing Ninjitsu Part III – “After the Initial Compromise”
---------------------------------------------------------------------------------------
This installment explores what can happen after the initial vulnerability is compromised and a threat becomes truly invasive – and how to proactively assess your systems against such attacks. This installment will explore what can happen after the initial vulnerability is compromised and a threat becomes truly invasive – and how to proactively assess your systems against such attacks.
* Presentation
* Slide deck
Pen Testing Ninjitsu Part I – “Windows Command Line Hero”
---------------------------------------------------------------------------------------
A brief introduction to the value of penetration testing + an overview of pen testing techniques using the Windows command shell.
* Presentation
* Slide deck
---------------------------------------------------------------------------------------
Pen Testing Ninjitsu Part II – “Crouching Netcat, Hidden Vulnerabilities”
---------------------------------------------------------------------------------------
An introduction to techniques for performing the functions of Netcat - such as moving files, scanning ports and creating backdoors - without using Netcat.
* Presentation
* Slide deck
---------------------------------------------------------------------------------------
Pen Testing Ninjitsu Part III – “After the Initial Compromise”
---------------------------------------------------------------------------------------
This installment explores what can happen after the initial vulnerability is compromised and a threat becomes truly invasive – and how to proactively assess your systems against such attacks. This installment will explore what can happen after the initial vulnerability is compromised and a threat becomes truly invasive – and how to proactively assess your systems against such attacks.
* Presentation
* Slide deck
No hay comentarios:
Publicar un comentario