Why Usual Pentests Suck - DefCamp - 2019
Offered By: DefCamp via YouTube
Course Description
Overview
Explore a critical analysis of conventional penetration testing methodologies in this 20-minute conference talk from DefCamp 2019. Delve into the limitations and shortcomings of typical pentests, examining various attack vectors such as spearphishing, password exploitation, flash drive vulnerabilities, intranet weaknesses, and physical security risks like lockpicking and tailgating. Learn why these common approaches may fall short in providing comprehensive security assessments and gain insights into more effective strategies for identifying and addressing potential vulnerabilities in organizational cybersecurity.
Syllabus
Intro
Who am I
Phone calls
spearfishing
passwords
flash drives
intranet
trash diving
lockpicking
tailgating
summary
QA
Taught by
DefCamp
Related Courses
Cybersecurity in Healthcare (Hospitals & Care Centres)Erasmus University Rotterdam via Coursera Cyber Security Foundations: Common Malware Attacks and Defense Strategies
EC-Council via FutureLearn The Complete Social Engineering, Phishing, OSINT & Malware
Udemy A Complete Cyber Security Guide For Beginners 2024
Udemy Learn Social Engineering From Scratch 2024
Udemy