YoVDO

Penetration Testing - The Other Stuff

Offered By: LASCON via YouTube

Tags

LASCON Courses Penetration Testing Courses Disaster Recovery Courses Data Management Courses

Course Description

Overview

Explore essential tools and techniques for effective penetration testing in this 53-minute LASCON conference talk. Learn how to organize and manage your work before, during, and after an engagement, covering topics such as scope creep, environment setup, terminal usage, file naming conventions, data collection methods, screen capture techniques, and reporting strategies. Discover valuable insights on handling default passwords, simplex locks, and clue gathering, while also examining the balance between art and science in penetration testing. Gain practical knowledge on disaster recovery and cultivating the right attitudes for success in the field of information security and beyond.

Syllabus

Intro
The Presentation
Scope Creep
Environment
Terminals
File Naming
Data Collecting
Screen Captures
Output Options
Reporting
Grappling hooks
Default passwords
Simplex locks
Clues
Ninja vs Pirate
Art vs Science
Recap
Disaster Recovery
Attitudes


Taught by

LASCON

Related Courses

Comparing WAF and RASP - Why?
LASCON via YouTube
API Security - Is it the New Application Attack Surface and How to Secure at Enterprise Scale
LASCON via YouTube
Privacy Impact Assessments - How Much Privacy Is Enough?
LASCON via YouTube
Your Frontier Defense - Understanding Web Application Firewalls
LASCON via YouTube
Doing This One Crazy Thing Will Change Your AppSec Program Forever
LASCON via YouTube