Главная
Study mode:
on
1
Intro
2
The Basics of Penetration Testing
3
Have we forgotten?
4
Security Spend (Gartner)
5
Option 1 - A real breach
6
Option 2 - A simulated breach
7
Adaptive Pentesting
8
December 2010
9
System Profiler
10
Setting the Stage
11
Profiling the target
12
Bypassing Windows UAC
13
Lessons Learned
14
The attack
15
The Teensy Attack
16
In-Line attack
17
Testing the jammer/sniffer
18
The Arduino Device
19
Modifying the TW523
20
The working Jammer
21
The Social-Engineer Toolkit v2.1
Description:
Explore adaptive penetration testing techniques in this 59-minute conference talk featuring renowned security experts Kevin Mitnick and Dave Kennedy. Delve into the basics of penetration testing, examining forgotten aspects and current security spending trends. Compare real breaches with simulated scenarios, and learn about innovative tools like the System Profiler. Discover methods for profiling targets, bypassing Windows UAC, and executing various attack strategies, including the Teensy Attack and In-Line attack. Gain insights into jamming and sniffing techniques, Arduino device applications, and the Social-Engineer Toolkit v2.1. Enhance your cybersecurity knowledge with this comprehensive overview of modern penetration testing approaches.

Adaptive Penetration Testing - Techniques and Strategies

Add to list
0:00 / 0:00