Главная
Study mode:
on
1
Intro
2
Security Awareness Training
3
General Thoughts
4
Shell
5
Cloud Migration
6
Heartbreaker Theory
7
Diminishing Returns
8
Attackers New World Order
9
Nagini
10
Oneline fix
11
SSH benchmark
12
Protocol version exchange
13
Enabling SSH
14
Dockerfile
15
DNS
16
AWS DNS
17
Logs
18
My Hypothesis
19
Nmap
20
Census
21
The Census
22
Census vs Shodan
23
I cant be the only person
24
Honeypot
25
Is it Detected
26
Did it Detect
27
Koalas
28
Data Dump
29
Summary
30
Whats next
31
WordPress
32
SSH Break
33
Conclusion
Description:
Explore the OSINT capabilities of pen-testing tools in this BSidesLV conference talk by John Brunn. Delve into security awareness training, cloud migration, and the "Heartbreaker Theory" of diminishing returns in cybersecurity. Examine the new world order for attackers, focusing on topics like SSH benchmarking, protocol version exchange, and AWS DNS logs. Compare Census and Shodan, investigate honeypots, and analyze data dumps. Learn about WordPress vulnerabilities and SSH break techniques. Gain insights into the evolving landscape of offensive security tools and their applications in open-source intelligence gathering.

Give the Dog a Bone - Exploring OSINT Capabilities of Pen-testing Tools

BSidesLV
Add to list