We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

So you think you want to be a penetration tester.

Formale Metadaten

Titel
So you think you want to be a penetration tester.
Serientitel
Anzahl der Teile
93
Autor
Lizenz
CC-Namensnennung 3.0 Unported:
Sie dürfen das Werk bzw. den Inhalt zu jedem legalen Zweck nutzen, verändern und in unveränderter oder veränderter Form vervielfältigen, verbreiten und öffentlich zugänglich machen, sofern Sie den Namen des Autors/Rechteinhabers in der von ihm festgelegten Weise nennen.
Identifikatoren
Herausgeber
Erscheinungsjahr
Sprache

Inhaltliche Metadaten

Fachgebiet
Genre
Abstract
So, you think you want to be a penetration tester, or you already are and don’t understand what the difference between you and all the other “so called” penetration testers out there. Think you know the difference between a Red Team, Penetration Test and a Vulnerability assessment? Know how to write a report your clients will actually read and understand? Can you leverage the strengths of your team mates to get through tough roadblocks, migrate, pivot, own and pillage? No? well this talk is probably for you then! We will go through the fascinating, intense and often crazily boring on-site assessment process. Talk about planning and performing Red Teams, how they are different, and why they can be super effective and have some fun along the way. I’ll tell you stories that will melt your face, brain and everything in between. Give you the answers to all of your questions you never knew you had, and probably make you question your life choices. By the end of this session you will be ready to take your next steps into the job you’ve always wanted, or know deep inside that you should probably look for something else. There will be no judgment or shame, only information, laughter and fun. Bio: Arch currently works on a Red Team for an agency with a 3 letter acronym. It’s not secret squirrel, or hush hush he just doesn’t like to talk about himself very much. He has 15 years of experience in penetration testing and cyber security with a background in control systems and security architecture.