Opening the Treasure Chest: Attacking Network Attached Storage on a Pen Test
Offered By: YouTube
Course Description
Overview
Explore techniques for attacking Network Attached Storage (NAS) devices during penetration testing in this conference talk from BSides Rhode Island 2013. Learn about vulnerabilities commonly found in NAS systems and how to exploit them effectively. Gain insights into the security implications of NAS devices in corporate networks and discover methods to improve their protection. Understand the importance of including NAS devices in penetration testing scopes and how to approach them systematically. Delve into real-world examples and case studies presented by the speaker, Russ, to enhance your knowledge of NAS security assessment.
Syllabus
BsidesRI 2013 4 Opening the Treasure Chest Attacking Network Attached Storage on a Pen Test Russ
Related Courses
Network SecurityGeorgia Institute of Technology via Udacity Proactive Computer Security
University of Colorado System via Coursera Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera Hacker101
HackerOne via Independent CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent