Overview
Syllabus
BreakPoint Labs
What is our Talk About
After a Pentest We Hear...
Caveats
Bash Kung Fu: Password Reuse
Tools Beyond Vulnerability Scanner
Takeaway Here....
Find out the Tech Stack
Understand your External Footprint (Cont)
Investigate Network Shares (Cont)
Address Web Applications Appropriately
Address Web Applications (Cont)
Find All the Devices and Appliances
Know Vulnerabilities Interesting to Attackers (Cont)
Be Aware of the impact of Outdated Windows Systems on
Understand OPSEC Failures and the Impact
Implement User Awareness Exercise
Final Thoughts on Tips
Pentest Trends
Useful Trainings & Links
Contact Us