- Default Category
- Enterprise Security
- Enterprise Security Weekly
- Enterprise Security Weekly, Interview
- Enterprise Security Weekly, News
- Enterprise Security Weekly, Technical Segment
- Enterprise Security Weekly, Topic
- Hack Naked News
- Paul's Security Weekly, Interview
- Paul's Security Weekly, News
- Paul's Security Weekly, Security News
- Paul's Security Weekly, Tech Segment
- Security News
- security weekly
- Security Weekly, Interview
- Security Weekly, Technical Segments
- Security Weekly, Tech Segment
- security weekly Interview
- Security weekly Technical Segment
- Startup Security Weekly
- Startup Security Weekly, News
- Tradecraft Security Weekly
Now displaying: December, 2013
Dec 9, 2013
In this presentation we continue to discover how to best prepare for a penetration test. However, this time it is a bit different, as we are going to cover how to prepare for the eventual compromise. What do attackers and penetration testers do once they exploit a system? How can you best prepare and detect and stop the pivot? Because you must... Stop.. The.. Pivot. We will also share a number of tricks on how to pivot without being detected, and how best to test your web proxies and egress firewalls.
Dec 8, 2013
Puffy-cheeked Paul, Larry and Jack are back with stories of the week from securing your Apache server to talking about Dave Kennedy and the healthcare.gov site, hacking bug bounties and security con videos are available online. Plus a ton more!
Dec 8, 2013
Thomas works for NCC Group as a Security Consultant, conducting all different types of security assessments. Ryan is a British Computer Security graduate, security enthusiast and Security Engineer for RandomStorm living in France. He is interested in Web Application Security and Information Security in general. http://www.scriptalert1.com is a very simple and concise platform to explain Cross-Site Scripting, it's dangers and mitigation. Our aim is for penetration testers to include a link in their pen test reports to the resource and to get it to be the de facto description for semi-technical / tech savvy managers.
Dec 8, 2013
Before he wrote hashcat he was a bug hunter for fun, focusing on open source software. After 2005 he only did bug hunting on commercial software and therefore not allowed to disclose product names. In 2010 he started hashcat and since that time it's the only project he's been working on.
©Copyright Defensive Intuition, LLC 2015