Главная
Study mode:
on
1
Introduction
2
About Me
3
About This Talk
4
What Should You Do
5
Gear
6
Tools
7
Plan Ahead
8
Find the Goods
9
Dont Get Cocky
10
Youre Not There to Have Fun
11
Dont Break Things
12
Dont Create Insecurity
13
Dont Get Caught
14
First Case Study
15
Reverse Brute Force
16
Responder
17
Whats Next
18
Physical Security
19
Case Study
20
Sequel Injection
21
Next Year
22
Scope
23
Dont hash dump
24
Getting caught
25
Servers are fragile
26
Its not just about domain admin
27
Not just a list of vulnerabilities
28
Most of what I learned about attacking systems
29
Always be constantly learning
30
How can we bypass this
31
The more the better
32
If Im understanding
33
OPSEC
34
Prerequisite Knowledge
35
PCI
36
Job Title
37
External Tools
38
Linux
39
Contact Information
40
Be Creative
41
Metasploit
Description:
Explore the world of penetration testing in this comprehensive conference talk from BSides Detroit 2016. Gain valuable insights from Calvin Hedler as he shares his expertise on becoming a successful pentester. Learn about essential gear, tools, and strategies for planning ahead and finding vulnerabilities. Discover the importance of maintaining professionalism, avoiding cocky behavior, and prioritizing security over personal enjoyment. Delve into case studies covering reverse brute force attacks, Responder tool usage, physical security challenges, and SQL injection techniques. Understand the significance of constant learning, creative problem-solving, and OPSEC in the field. Acquire knowledge on prerequisite skills, job titles, external tools, Linux proficiency, and the use of Metasploit. Whether you're a beginner or an experienced professional, this talk offers practical advice and real-world examples to enhance your penetration testing skills.

So You Want to Be a Pentester

Add to list