Penetration Testing

Part II of Zen & The Art Of An Internal Penetration Testing Program

Share

In the spirit of epic sequels, we are pleased to announce the follow-on Webcast to the highly successful Zen and The Art Of An Internal Penetration Testing Program.
This webcast is the second part of a series presented by Paul Asadoorian in collaboration with Core Security Technologies. The presentation will be full of tips and tricks for tying vulnerability scanning, penetration testing and reporting into an efficient, repeatable testing process.
Whether you are a third-party performing penetration tests or want to test your internal network and systems, this webcast is for you! In Part II we will cover the following topics:

  • Using Nessus, and running nessuscmd to automate vulnerability scanning
  • Exploiting systems without exploits, and integrating this process into your internal testing program
  • Post-exploitation, and where it fits in internal testing
  • Importing Nessus results into CORE IMPACT
  • Post-Exploitation scripting in popular frameworks (Metasploit & Core IMPACT)
  • zen2.jpeg

    Sign up here (Registration Required)
    Forum: Online forum discussion for the Webcast series.
    – Security Weekly Crew

    Paul Asadoorian

    Paul Asadoorian is currently the Principal Security Evangelist for Eclypsium, focused on firmware and supply chain security awareness. Paul’s passion for firmware security extends back many years to the WRT54G hacking days and reverse engineering firmware on IoT devices for fun. Paul and his long-time podcast co-host Larry Pesce co-authored the book “WRTG54G Ultimate Hacking” in 2007, which fueled the firmware hacking fire even more. Paul has worked in technology and information security for over 20 years, holding various security and engineering roles in a lottery company, university, ISP, independent penetration tester, and security product companies such as Tenable. In 2005 Paul founded Security Weekly, a weekly podcast dedicated to hacking and information security. In 2020 Security Weekly was acquired by the Cyberrisk Alliance. Paul is still the host of one of the longest-running security podcasts, Paul’s Security Weekly, he enjoys coding in Python & telling everyone he uses Linux.

    Get daily email updates

    SC Media's daily must-read of the most current and pressing daily news

    By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.