We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

So you think you want to be a penetration tester.

00:00

Formal Metadata

Title
So you think you want to be a penetration tester.
Title of Series
Number of Parts
93
Author
License
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
So, you think you want to be a penetration tester, or you already are and don’t understand what the difference between you and all the other “so called” penetration testers out there. Think you know the difference between a Red Team, Penetration Test and a Vulnerability assessment? Know how to write a report your clients will actually read and understand? Can you leverage the strengths of your team mates to get through tough roadblocks, migrate, pivot, own and pillage? No? well this talk is probably for you then! We will go through the fascinating, intense and often crazily boring on-site assessment process. Talk about planning and performing Red Teams, how they are different, and why they can be super effective and have some fun along the way. I’ll tell you stories that will melt your face, brain and everything in between. Give you the answers to all of your questions you never knew you had, and probably make you question your life choices. By the end of this session you will be ready to take your next steps into the job you’ve always wanted, or know deep inside that you should probably look for something else. There will be no judgment or shame, only information, laughter and fun. Bio: Arch currently works on a Red Team for an agency with a 3 letter acronym. It’s not secret squirrel, or hush hush he just doesn’t like to talk about himself very much. He has 15 years of experience in penetration testing and cyber security with a background in control systems and security architecture.
Statistical hypothesis testingBitUniverse (mathematics)Slide ruleHacker (term)Right angleProcess (computing)Level (video gaming)Self-organizationGreatest elementInformation security
WordStatistical hypothesis testingProcess (computing)BitStatistical hypothesis testingInheritance (object-oriented programming)Software testingRight angleFamilyArchaeological field surveyLecture/Conference
Statistical hypothesis testingMultiplication signMereologyBitExpert systemProcess (computing)NumberWebsitePlastikkarteJSON
NeuroinformatikProcess (computing)Multiplication signMessage passingStatistical hypothesis testingBitRight angleHacker (term)Elasticity (physics)CuboidTelecommunicationSlide ruleInternetworkingEuler anglesPhysical systemModal logicSoftware testingSystem administratorCausalityGoodness of fitRegulärer Ausdruck <Textverarbeitung>Lecture/Conference
Process (computing)System callBitLevel (video gaming)Self-organizationVideo gameLine (geometry)CryptographyPlanningSocial engineering (security)Modal logicInformation securitySpeech synthesisCuboidStatistical hypothesis testingClient (computing)Goodness of fitControl flowPhysicalismGroup actionAdaptive behaviorVulnerability (computing)MereologyOrder (biology)Hacker (term)Limit (category theory)Electronic mailing list1 (number)LinearizationRight angleTraffic reportingMultiplication signPerturbation theoryComputer clusterClosed setInsertion lossCausalityInformationFitness function
Set (mathematics)Client (computing)Process (computing)CryptographyFormal grammarPlanningBitWordMultiplication signPoint (geometry)Traffic reportingGodSingle-precision floating-point formatTwitterBoss CorporationSystem administratorExclusive orLine (geometry)SoftwareNichtlineares GleichungssystemElectronic mailing listPivot elementIP addressVulnerability (computing)Water vaporWeb pageCausalityForm (programming)Statistical hypothesis testingRight angleInsertion lossPhysical systemAmsterdam Ordnance DatumDivisorWebsiteLecture/Conference
Statistical hypothesis testingMultiplication signLevel (video gaming)SoftwareSoftware testingArithmetic meanClient (computing)Dependent and independent variablesDifferent (Kate Ryan album)Point (geometry)Right angleMoment (mathematics)LengthLatent heatVulnerability (computing)Server (computing)Film editingPhysical systemPublic key certificateVector potentialScripting languageGoodness of fitIncidence algebraCausalityLecture/Conference
NeuroinformatikPhysical systemGroup actionControl flowFormal languageTraffic reportingInstance (computer science)Process (computing)WebsiteDampingVulnerability (computing)Set (mathematics)SoftwareVideo gameClient (computing)Dependent and independent variablesStaff (military)Incidence algebraCoprocessorModule (mathematics)WritingComputer programmingFundamental theorem of algebraMultiplication signWhiteboardSoftware testingInformation securityCybersexLecture/Conference
Computer animation
Transcript: English(auto-generated)