際際滷shows by User: ZackMeyers / http://www.slideshare.net/images/logo.gif 際際滷shows by User: ZackMeyers / Thu, 23 Feb 2017 00:27:48 GMT 際際滷Share feed for 際際滷shows by User: ZackMeyers Bsides-Philly-2016-Finding-A-Companys-BreakPoint /slideshow/bsidesphilly2016findingacompanysbreakpoint/72481918 bsidesphi-finding-a-companys-breakpoint-v1-170223002748
Finding A Company's BreakPoint The goal of this talk is to help educate those who are new or learning penetration testing and hacking techniques. We tend to see the same mindset applied when we speak to those new to pentesting Scan something with Nessus to find the vulnerability, and then exploit itRight?. This is very far from reality when we talk about pentesting or even real world attacks. In this talk we will cover five (5) techniques that we find to be highly effective at establishing an initial foothold into the target network including: phishing, multicast protocol poisoning, SMBrelay attacks, account compromise and web application vulnerabilities. Also watch this talk: https://www.youtube.com/watch?v=-G0v1y-Vaoo&t=1337s]]>

Finding A Company's BreakPoint The goal of this talk is to help educate those who are new or learning penetration testing and hacking techniques. We tend to see the same mindset applied when we speak to those new to pentesting Scan something with Nessus to find the vulnerability, and then exploit itRight?. This is very far from reality when we talk about pentesting or even real world attacks. In this talk we will cover five (5) techniques that we find to be highly effective at establishing an initial foothold into the target network including: phishing, multicast protocol poisoning, SMBrelay attacks, account compromise and web application vulnerabilities. Also watch this talk: https://www.youtube.com/watch?v=-G0v1y-Vaoo&t=1337s]]>
Thu, 23 Feb 2017 00:27:48 GMT /slideshow/bsidesphilly2016findingacompanysbreakpoint/72481918 ZackMeyers@slideshare.net(ZackMeyers) Bsides-Philly-2016-Finding-A-Companys-BreakPoint ZackMeyers Finding A Company's BreakPoint The goal of this talk is to help educate those who are new or learning penetration testing and hacking techniques. We tend to see the same mindset applied when we speak to those new to pentesting Scan something with Nessus to find the vulnerability, and then exploit itRight?. This is very far from reality when we talk about pentesting or even real world attacks. In this talk we will cover five (5) techniques that we find to be highly effective at establishing an initial foothold into the target network including: phishing, multicast protocol poisoning, SMBrelay attacks, account compromise and web application vulnerabilities. Also watch this talk: https://www.youtube.com/watch?v=-G0v1y-Vaoo&t=1337s <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/bsidesphi-finding-a-companys-breakpoint-v1-170223002748-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Finding A Company&#39;s BreakPoint The goal of this talk is to help educate those who are new or learning penetration testing and hacking techniques. We tend to see the same mindset applied when we speak to those new to pentesting Scan something with Nessus to find the vulnerability, and then exploit itRight?. This is very far from reality when we talk about pentesting or even real world attacks. In this talk we will cover five (5) techniques that we find to be highly effective at establishing an initial foothold into the target network including: phishing, multicast protocol poisoning, SMBrelay attacks, account compromise and web application vulnerabilities. Also watch this talk: https://www.youtube.com/watch?v=-G0v1y-Vaoo&amp;t=1337s
Bsides-Philly-2016-Finding-A-Companys-BreakPoint from Zack Meyers
]]>
531 2 https://cdn.slidesharecdn.com/ss_thumbnails/bsidesphi-finding-a-companys-breakpoint-v1-170223002748-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Web Hacking With Burp Suite 101 /slideshow/web-hacking-with-burp-suite-101/60562418 webhacking-burpsuite101-160406134949
In this talk, well walk through utilizing one of the most popular web vulnerability testing frameworks BurpSuite. During this presentation we will cover the process of how to conduct a successful web penetration tests, while utilizing BurpSuite's features and tools (Free and Pro Version). This discussion will also cover realistic examples and a brief overview of common vulnerabilities found in web applications.]]>

In this talk, well walk through utilizing one of the most popular web vulnerability testing frameworks BurpSuite. During this presentation we will cover the process of how to conduct a successful web penetration tests, while utilizing BurpSuite's features and tools (Free and Pro Version). This discussion will also cover realistic examples and a brief overview of common vulnerabilities found in web applications.]]>
Wed, 06 Apr 2016 13:49:49 GMT /slideshow/web-hacking-with-burp-suite-101/60562418 ZackMeyers@slideshare.net(ZackMeyers) Web Hacking With Burp Suite 101 ZackMeyers In this talk, well walk through utilizing one of the most popular web vulnerability testing frameworks BurpSuite. During this presentation we will cover the process of how to conduct a successful web penetration tests, while utilizing BurpSuite's features and tools (Free and Pro Version). This discussion will also cover realistic examples and a brief overview of common vulnerabilities found in web applications. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/webhacking-burpsuite101-160406134949-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In this talk, well walk through utilizing one of the most popular web vulnerability testing frameworks BurpSuite. During this presentation we will cover the process of how to conduct a successful web penetration tests, while utilizing BurpSuite&#39;s features and tools (Free and Pro Version). This discussion will also cover realistic examples and a brief overview of common vulnerabilities found in web applications.
Web Hacking With Burp Suite 101 from Zack Meyers
]]>
8337 16 https://cdn.slidesharecdn.com/ss_thumbnails/webhacking-burpsuite101-160406134949-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://public.slidesharecdn.com/v2/images/profile-picture.png https://cdn.slidesharecdn.com/ss_thumbnails/bsidesphi-finding-a-companys-breakpoint-v1-170223002748-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/bsidesphilly2016findingacompanysbreakpoint/72481918 Bsides-Philly-2016-Fin... https://cdn.slidesharecdn.com/ss_thumbnails/webhacking-burpsuite101-160406134949-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/web-hacking-with-burp-suite-101/60562418 Web Hacking With Burp ...