Why Usual Pentests Suck - DefCamp - 2019
Offered By: DefCamp via YouTube
Course Description
Overview
Explore a critical analysis of conventional penetration testing methodologies in this 20-minute conference talk from DefCamp 2019. Delve into the limitations and shortcomings of typical pentests, examining various attack vectors such as spearphishing, password exploitation, flash drive vulnerabilities, intranet weaknesses, and physical security risks like lockpicking and tailgating. Learn why these common approaches may fall short in providing comprehensive security assessments and gain insights into more effective strategies for identifying and addressing potential vulnerabilities in organizational cybersecurity.
Syllabus
Intro
Who am I
Phone calls
spearfishing
passwords
flash drives
intranet
trash diving
lockpicking
tailgating
summary
QA
Taught by
DefCamp
Related Courses
Network SecurityGeorgia Institute of Technology via Udacity Proactive Computer Security
University of Colorado System via Coursera Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera Hacker101
HackerOne via Independent CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent