YoVDO

Why Usual Pentests Suck - DefCamp - 2019

Offered By: DefCamp via YouTube

Tags

DefCamp Courses Penetration Testing Courses Social Engineering Courses Lockpicking Courses

Course Description

Overview

Explore a critical analysis of conventional penetration testing methodologies in this 20-minute conference talk from DefCamp 2019. Delve into the limitations and shortcomings of typical pentests, examining various attack vectors such as spearphishing, password exploitation, flash drive vulnerabilities, intranet weaknesses, and physical security risks like lockpicking and tailgating. Learn why these common approaches may fall short in providing comprehensive security assessments and gain insights into more effective strategies for identifying and addressing potential vulnerabilities in organizational cybersecurity.

Syllabus

Intro
Who am I
Phone calls
spearfishing
passwords
flash drives
intranet
trash diving
lockpicking
tailgating
summary
QA


Taught by

DefCamp

Related Courses

Network Security
Georgia Institute of Technology via Udacity
Proactive Computer Security
University of Colorado System via Coursera
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera
Hacker101
HackerOne via Independent
CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent