Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the vulnerabilities in penetration testing practices and tools in this 47-minute Black Hat conference talk. Examine how simplified training materials can lead to inadequate protection of client data and testing operations. Learn about the risks penetration testers face from malicious actors and witness a live demonstration of techniques for hijacking standard testing procedures. Gain valuable insights into securing your testing practices and discover tools released alongside the presentation. Delve into topics such as client security, secure communication, data protection, open-source intelligence gathering, and common weaknesses in the field. Understand the most insecure practices and receive recommendations for improving penetration testing operations. Conclude with key takeaways to enhance the security of your penetration testing methodologies.
Syllabus
Welcome
Who are you
Penetration testing in general
Agenda
Study Goal
Client Security
Communication Secure Hate
Client Data in Transit
Open Source Intelligence Gathering
Study Questions
Study Results
Common Weaknesses
Most Insecure Practices
Administrative Proxy List
ZigBee
Recommendations
Demonstration
Conclusion
Core Point
Taught by
Black Hat