SEARCH
TOOLBOX
LANGUAGES
Search results

Search results

From BruCON 2017

Jump to: navigation, search
  • ...ations find themselves paying for insecure software, paying for a security test, then paying the vendor to fix the software. It’s not just inefficient, i
    1 KB (245 words) - 21:13, 9 September 2014
  • ...ols?!? This course teaches hands-on penetration testing techniques used to test individual components of a control system, including embedded electronic fi * Preparing for a penetration test
    10 KB (1,421 words) - 21:00, 29 August 2015
  • ...to use your own laptop and its not an Apple Mac, we strongly recommend you test it with our projector during lunchtime the day you are giving the talk (or
    8 KB (1,370 words) - 14:20, 27 November 2015
  • ...and behavior. Many hackers today are employed by the security industry and test security software and systems to improve the security of our networks and a
    13 KB (2,068 words) - 10:48, 27 April 2017
  • ...researcher, you'll learn how to create an on-demand, cloud based, security test lab with no hardware, for significantly less than the cost of a first date.
    19 KB (3,054 words) - 12:50, 13 October 2015
  • ...ourse! This course teaches hands-on penetration testing techniques used to test embedded electronic field devices, network protocols, RF communications, an
    9 KB (1,234 words) - 07:27, 5 September 2013
  • teaches hands-on penetration testing techniques used to test embedded
    9 KB (1,301 words) - 08:18, 28 January 2014
  • latest manual techniques to perform an end-to-end penetration test. After a quick overview of pen testing ...of the course will be performing an instructor lead, hands-on penetration test. We don’t give
    6 KB (849 words) - 08:18, 28 January 2014
  • ...lities in the limited amount of time. Adding to its high configurability & test separation, the latest improvements in OWTF have taken it a step ahead in i
    524 bytes (84 words) - 20:54, 9 September 2014
  • ...ulate a botnet, this makes it easier for the average penetration tester to test a website using multiple IP addresses (i.e. like real-world attackers havin This makes it practical to test if security controls can be bypassed when the origin IP of the scanning mac
    1 KB (191 words) - 20:57, 9 September 2014
  • ...and the different kinds of vulnerabilities in mobile applications. You can test your skills in the CTF at the end ! ...After the workshop, the students will be able to successfully penetration test and secure mobile applications. All the students will get a PDF presentatio
    6 KB (786 words) - 14:02, 4 April 2016
  • ...agements for highly secured environments. The course runs as a penetration test of a secure environment with detailed discussion and use of custom PowerShe ...security testing after this training. This training aims to change how you test a Windows based environment.
    7 KB (932 words) - 19:42, 29 May 2016
  • This course teaches hands-on penetration testing techniques used to test individual components of a control system, including embedded electronic fi * Preparing for a penetration test
    11 KB (1,531 words) - 08:03, 1 October 2016
  • ...agements for highly secured environments. The course runs as a penetration test of a secure environment with detailed discussion and use of custom PowerShe ...security testing after this training. This training aims to change how you test a Windows based environment.
    7 KB (935 words) - 19:55, 29 May 2016
  • ...thing between lesser- and greater-than and leads a small yet exquisite pen-test company. He commonly pesters peaceful attendees on various capitalist confe
    4 KB (581 words) - 14:43, 6 June 2017
  • ...agements for highly secured environments. The course runs as a penetration test of a secure environment (Forest functional level 2012 R2 and fully patched ...security testing after this training. This training aims to change how you test a Windows based environment.
    7 KB (1,044 words) - 10:48, 8 June 2017
  • ...years of experience in programming, security testing, source code review, test automation, functional and technical analysis, development and database des
    650 bytes (103 words) - 20:09, 5 July 2017
  • ...n working at Nynox in August 2016. Between the red teaming and penetration test engagements he focusses on security research. While he has only limited...
    766 bytes (119 words) - 20:09, 5 July 2017
  • ...o approach the problem and verify the accuracy by cross verifying with the test data helps us choose an ideal algorithm for the problem in hand. This lab s
    2 KB (351 words) - 20:13, 5 July 2017
  • ...that can help us slice and dice Event Logs like Get-WinEvent. We will also test scripts and tools that are made for monitoring and detection, such as DeepB
    2 KB (274 words) - 20:11, 5 July 2017

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)