SEARCH
TOOLBOX
LANGUAGES
Search results

Search results

From BruCON 2016

Jump to: navigation, search
  • ...and other critical infrastructure, we'll perform hands-­‐on penetration testing tasks on user interfaces (on master servers and field device maintenance in ...accept to realize the desired benefits. To minimize this risk, penetration testing in conjunction with other security assessment types must be performed to mi
    10 KB (1,421 words) - 22:00, 29 August 2015
  • Immerse yourself into the world of pen testing and application security by attending the BruCON 2016 Trainings (24-26 Octo ...l have Free access for one month after the training. The class consists of hands-on, challenges and demonstrations.
    5 KB (704 words) - 21:18, 20 June 2016
  • =Lessons in Mobile Penetration Testing by Zach Lanier= ...tions, investigate their weaknesses and vulnerabilities, and give students hands-on experience in analyzing and attacking them. Through lectures and interactiv
    4 KB (534 words) - 08:27, 5 September 2013
  • ...tems and other critical infrastructure, we'll perform hands-on penetration testing tasks on embedded electronic field devices, their RF communications, and th ...th utilities and customers must accept. To minimize this risk, penetration testing must be performed to minimize vulnerabilities before attackers can exploit
    9 KB (1,234 words) - 08:27, 5 September 2013
  • teaches hands-on penetration testing techniques used to test embedded around the formal penetration testing methodology created by the
    9 KB (1,301 words) - 09:18, 28 January 2014
  • Come take the official Samurai-WTF (Web Testing Framework) training course given by one of the founders ...s to perform an end-to-end penetration test. After a quick overview of pen testing
    6 KB (849 words) - 09:18, 28 January 2014
  • ...ning is based on the best selling book “Backtrack 5 Wireless Penetration Testing" and will provide a highly technical and in-depth treatment of Wi-Fi securi During the course of this training participants will do over 25+ hands-on lab sessions and will fight it out against live CTF challenges. These inclu
    3 KB (396 words) - 11:35, 25 August 2014
  • =Red Team Testing= ...o the security world. Their combined experience can easily fill a two week training course and unfortunately we "only" have three days.
    4 KB (597 words) - 21:54, 21 January 2015
  • ...ng on exploiting mobile applications for the iOS and Android platform. The training is based on exploiting Damn Vulnerable iOS app and other vulnerable apps wh ...will get a PDF presentation with all the slides, vulnerable apps used for training, sample source code and all the necessary tools used to pentest mobile appl
    6 KB (786 words) - 15:02, 4 April 2016
  • ...will cover assessing IoT attack surfaces and finding security issues with hands-on exercises and is valuable for anybody interested to learn about IoT securit ...essing IoT attack surfaces and finding security issues. The course will be hands-on giving attendees the ability to try things themselves rather than just watc
    6 KB (849 words) - 23:36, 16 December 2015
  • =PowerShell for Penetration Testers= ...l have Free access for one month after the training. The class consists of hands-on, challenges and demonstrations
    7 KB (932 words) - 20:42, 29 May 2016
  • ...ms and other critical infrastructure, we will perform hands-on penetration testing tasks on user interfaces (on master servers and field device maintenance in ...ccept to realize the desired benefits. To minimize this risk, penetration testing in conjunction with other security assessment types must be performed to mi
    11 KB (1,531 words) - 09:03, 1 October 2016
  • ...l have Free access for one month after the training. The class consists of hands-on, challenges and demonstrations Penetration Tests and Red Team operations for secured environments need altered approac
    7 KB (935 words) - 20:55, 29 May 2016