Search results
From BruCON 2017
Create the page "Test" on this wiki! See also the search results found.
- ...ations find themselves paying for insecure software, paying for a security test, then paying the vendor to fix the software. It’s not just inefficient, i1 KB (245 words) - 21:13, 9 September 2014
- ...ols?!? This course teaches hands-on penetration testing techniques used to test individual components of a control system, including embedded electronic fi * Preparing for a penetration test10 KB (1,421 words) - 21:00, 29 August 2015
- ...to use your own laptop and its not an Apple Mac, we strongly recommend you test it with our projector during lunchtime the day you are giving the talk (or8 KB (1,370 words) - 14:20, 27 November 2015
- ...and behavior. Many hackers today are employed by the security industry and test security software and systems to improve the security of our networks and a13 KB (2,068 words) - 10:48, 27 April 2017
- ...researcher, you'll learn how to create an on-demand, cloud based, security test lab with no hardware, for significantly less than the cost of a first date.19 KB (3,054 words) - 12:50, 13 October 2015
- ...ourse! This course teaches hands-on penetration testing techniques used to test embedded electronic field devices, network protocols, RF communications, an9 KB (1,234 words) - 07:27, 5 September 2013
- teaches hands-on penetration testing techniques used to test embedded9 KB (1,301 words) - 08:18, 28 January 2014
- latest manual techniques to perform an end-to-end penetration test. After a quick overview of pen testing ...of the course will be performing an instructor lead, hands-on penetration test. We don’t give6 KB (849 words) - 08:18, 28 January 2014
- ...lities in the limited amount of time. Adding to its high configurability & test separation, the latest improvements in OWTF have taken it a step ahead in i524 bytes (84 words) - 20:54, 9 September 2014
- ...ulate a botnet, this makes it easier for the average penetration tester to test a website using multiple IP addresses (i.e. like real-world attackers havin This makes it practical to test if security controls can be bypassed when the origin IP of the scanning mac1 KB (191 words) - 20:57, 9 September 2014
- ...and the different kinds of vulnerabilities in mobile applications. You can test your skills in the CTF at the end ! ...After the workshop, the students will be able to successfully penetration test and secure mobile applications. All the students will get a PDF presentatio6 KB (786 words) - 14:02, 4 April 2016
- ...agements for highly secured environments. The course runs as a penetration test of a secure environment with detailed discussion and use of custom PowerShe ...security testing after this training. This training aims to change how you test a Windows based environment.7 KB (932 words) - 19:42, 29 May 2016
- This course teaches hands-on penetration testing techniques used to test individual components of a control system, including embedded electronic fi * Preparing for a penetration test11 KB (1,531 words) - 08:03, 1 October 2016
- ...agements for highly secured environments. The course runs as a penetration test of a secure environment with detailed discussion and use of custom PowerShe ...security testing after this training. This training aims to change how you test a Windows based environment.7 KB (935 words) - 19:55, 29 May 2016
- ...thing between lesser- and greater-than and leads a small yet exquisite pen-test company. He commonly pesters peaceful attendees on various capitalist confe4 KB (581 words) - 14:43, 6 June 2017
- ...agements for highly secured environments. The course runs as a penetration test of a secure environment (Forest functional level 2012 R2 and fully patched ...security testing after this training. This training aims to change how you test a Windows based environment.7 KB (1,044 words) - 10:48, 8 June 2017
- ...years of experience in programming, security testing, source code review, test automation, functional and technical analysis, development and database des650 bytes (103 words) - 20:09, 5 July 2017
- ...n working at Nynox in August 2016. Between the red teaming and penetration test engagements he focusses on security research. While he has only limited...766 bytes (119 words) - 20:09, 5 July 2017
- ...o approach the problem and verify the accuracy by cross verifying with the test data helps us choose an ideal algorithm for the problem in hand. This lab s2 KB (351 words) - 20:13, 5 July 2017
- ...that can help us slice and dice Event Logs like Get-WinEvent. We will also test scripts and tools that are made for monitoring and detection, such as DeepB2 KB (274 words) - 20:11, 5 July 2017