Главная
Study mode:
on
1
BreakPoint Labs
2
What is our Talk About
3
After a Pentest We Hear...
4
Caveats
5
Bash Kung Fu: Password Reuse
6
Tools Beyond Vulnerability Scanner
7
Takeaway Here....
8
Find out the Tech Stack
9
Understand your External Footprint (Cont)
10
Investigate Network Shares (Cont)
11
Address Web Applications Appropriately
12
Address Web Applications (Cont)
13
Find All the Devices and Appliances
14
Know Vulnerabilities Interesting to Attackers (Cont)
15
Be Aware of the impact of Outdated Windows Systems on
16
Understand OPSEC Failures and the Impact
17
Implement User Awareness Exercise
18
Final Thoughts on Tips
19
Pentest Trends
20
Useful Trainings & Links
21
Contact Us
Description:
Explore a comprehensive talk from BSides NOVA 2018 that combines penetration testing techniques with vulnerability management strategies. Discover how to enhance your security posture by incorporating pentest methodologies into your existing vulnerability management processes. Learn about password reuse detection, advanced tools beyond traditional vulnerability scanners, and techniques for understanding your external footprint. Gain insights on investigating network shares, addressing web application vulnerabilities, and identifying all devices and appliances in your environment. Understand the impact of outdated Windows systems, OPSEC failures, and the importance of user awareness exercises. Delve into current pentest trends and receive recommendations for useful training resources to further develop your skills in this critical area of cybersecurity.

Adding Pentest Sauce to Your Vulnerability Management Recipe

Add to list
0:00 / 0:00