Opening the Treasure Chest: Attacking Network Attached Storage on a Pen Test
Offered By: YouTube
Course Description
Overview
Explore techniques for attacking Network Attached Storage (NAS) devices during penetration testing in this conference talk from BSides Rhode Island 2013. Learn about vulnerabilities commonly found in NAS systems and how to exploit them effectively. Gain insights into the security implications of NAS devices in corporate networks and discover methods to improve their protection. Understand the importance of including NAS devices in penetration testing scopes and how to approach them systematically. Delve into real-world examples and case studies presented by the speaker, Russ, to enhance your knowledge of NAS security assessment.
Syllabus
BsidesRI 2013 4 Opening the Treasure Chest Attacking Network Attached Storage on a Pen Test Russ
Related Courses
An Introduction to Computer NetworksStanford University via Independent Computer Networks
University of Washington via Coursera Computer Networking
Georgia Institute of Technology via Udacity Cybersecurity and Its Ten Domains
University System of Georgia via Coursera Model Building and Validation
AT&T via Udacity