SEARCH
TOOLBOX
LANGUAGES
Search results

Search results

From BruCON 2016

Jump to: navigation, search
  • ...ations find themselves paying for insecure software, paying for a security test, then paying the vendor to fix the software. It’s not just inefficient, i
    1 KB (245 words) - 21:13, 9 September 2014
  • ...ols?!? This course teaches hands-on penetration testing techniques used to test individual components of a control system, including embedded electronic fi * Preparing for a penetration test
    10 KB (1,421 words) - 21:00, 29 August 2015
  • ...to use your own laptop and its not an Apple Mac, we strongly recommend you test it with our projector during lunchtime the day you are giving the talk (or
    8 KB (1,370 words) - 14:20, 27 November 2015
  • ...and behavior. Many hackers today are employed by the security industry and test security software and systems to improve the security of our networks and a
    13 KB (2,078 words) - 14:11, 27 November 2015
  • Test:
    291 bytes (47 words) - 23:08, 19 July 2010
  • ...researcher, you'll learn how to create an on-demand, cloud based, security test lab with no hardware, for significantly less than the cost of a first date.
    19 KB (3,054 words) - 12:50, 13 October 2015
  • ...ourse! This course teaches hands-on penetration testing techniques used to test embedded electronic field devices, network protocols, RF communications, an
    9 KB (1,234 words) - 07:27, 5 September 2013
  • teaches hands-on penetration testing techniques used to test embedded
    9 KB (1,301 words) - 08:18, 28 January 2014
  • latest manual techniques to perform an end-to-end penetration test. After a quick overview of pen testing ...of the course will be performing an instructor lead, hands-on penetration test. We don’t give
    6 KB (849 words) - 08:18, 28 January 2014
  • ...lities in the limited amount of time. Adding to its high configurability & test separation, the latest improvements in OWTF have taken it a step ahead in i
    524 bytes (84 words) - 20:54, 9 September 2014
  • ...ulate a botnet, this makes it easier for the average penetration tester to test a website using multiple IP addresses (i.e. like real-world attackers havin This makes it practical to test if security controls can be bypassed when the origin IP of the scanning mac
    1 KB (191 words) - 20:57, 9 September 2014
  • ...and the different kinds of vulnerabilities in mobile applications. You can test your skills in the CTF at the end ! ...After the workshop, the students will be able to successfully penetration test and secure mobile applications. All the students will get a PDF presentatio
    6 KB (786 words) - 14:02, 4 April 2016
  • ...agements for highly secured environments. The course runs as a penetration test of a secure environment with detailed discussion and use of custom PowerShe ...security testing after this training. This training aims to change how you test a Windows based environment.
    7 KB (932 words) - 19:42, 29 May 2016
  • This course teaches hands-on penetration testing techniques used to test individual components of a control system, including embedded electronic fi * Preparing for a penetration test
    11 KB (1,531 words) - 08:03, 1 October 2016
  • ...agements for highly secured environments. The course runs as a penetration test of a secure environment with detailed discussion and use of custom PowerShe ...security testing after this training. This training aims to change how you test a Windows based environment.
    7 KB (935 words) - 19:55, 29 May 2016