Why Usual Pentests Suck - DefCamp - 2019
Offered By: DefCamp via YouTube
Course Description
Overview
Explore a critical analysis of conventional penetration testing methodologies in this 20-minute conference talk from DefCamp 2019. Delve into the limitations and shortcomings of typical pentests, examining various attack vectors such as spearphishing, password exploitation, flash drive vulnerabilities, intranet weaknesses, and physical security risks like lockpicking and tailgating. Learn why these common approaches may fall short in providing comprehensive security assessments and gain insights into more effective strategies for identifying and addressing potential vulnerabilities in organizational cybersecurity.
Syllabus
Intro
Who am I
Phone calls
spearfishing
passwords
flash drives
intranet
trash diving
lockpicking
tailgating
summary
QA
Taught by
DefCamp
Related Courses
The Model of Post-Quantum Signature Using Verkle Tree - DefCamp - 2022DefCamp via YouTube The Anatomy of Wiper Malware - DefCamp - 2022
DefCamp via YouTube Internet Balkanization in an Era of Military Conflict - Dan Demeter - DefCamp - 2022
DefCamp via YouTube How We Analyzed and Built an Exploit PoC for CVE-2022-24086, a Magento RCE - Catalin Filip - DefCamp - 2022
DefCamp via YouTube To Log, or Not to Log! That Is the Question - DefCamp - 2022
DefCamp via YouTube