Evolving Pentests to: Objective Penetration Testing
5
Requires Thinking Outside of the Box
6
Manufacturing Heist
7
Phishing First!
8
Using Trust
9
Bypassing Sandbox Technology
10
Compromised Boxes
11
Proper Segmentation
12
Using Physical
13
Implant
14
PCI Pentest
15
Port Scan PCI Ranges
16
Responder
17
Domain Admins
18
Clear-Text Creds/Kerberos Tokens
19
Pageant.exe Running
20
SSH @
21
Having Fun With It
22
Concept of SHIPS
23
Connectors
24
PTF Basics
25
Token/Password Hunter
26
Quick Code (Password Hunter)
Description:
Explore innovative penetration testing techniques in this 55-minute conference talk from BSides Cleveland 2015. Discover how to evolve traditional pentests into objective-driven assessments that require thinking outside the box. Learn about manufacturing heists, leveraging trust through phishing, bypassing sandbox technology, and exploiting compromised systems. Delve into topics like proper network segmentation, physical implants, PCI pentesting, and domain admin compromises. Gain insights on clear-text credential harvesting, Kerberos token manipulation, and SSH exploitation. Understand the concept of SHIPS, connectors, and PTF basics. Master token and password hunting techniques, including quick code demonstrations for efficient password discovery.