Главная
Study mode:
on
1
Intro
2
Introduction...
3
Why Can't I?
4
Getting Buy-In
5
Internal Customers
6
External Clients
7
Address their needs
8
Without permission
9
With permission
10
Legal Issues
11
What's in Scope?
12
Other Devices - Pitfalls
13
Catastrophic Failures
14
What is Allowed?
15
Success / Failure?
16
Definite Failures
17
Call to Action
18
Questions
Description:
Explore the intricacies of obtaining permission for penetration testing in this 43-minute conference talk from BSides Philly 2016. Delve into the challenges of securing approval, addressing client needs, and navigating legal issues in cybersecurity testing. Learn about defining scope, avoiding pitfalls with external devices, and handling potential catastrophic failures. Gain insights on determining allowed actions, measuring success, and recognizing definite failures in penetration testing scenarios. Conclude with a call to action and engage in a Q&A session to deepen your understanding of ethical hacking practices.

Getting Permission to Break Things

Add to list