In the real world, attackers don’t stop once a low-level machine is compromised – and neither should your security tests. Once they’re in, attackers are going to try to find their way to your organization’s most
sensitive data – so it’s critical for you to proactively assess how your security infrastructure will respond after they kick-in your virtual front door.
Please join Ed Skoudis, SANS instructor and co-founder of Intelguardians, for the third installment of his Penetration Testing Ninjitsu webcast series: “Pen Testing Ninjitsu III: After the Initial Compromise”
> Register here: http://www.coresecurity.com/Form/generi ... /ninjitsu3
During this webcast, Skoudis will look at how to take the next step in real-world security testing once you gain initial command-shell access on a target machine.
You’ll learn how to:
* assess your readiness against threats that compromise Windows boxes and turn them against backend infrastructure
* use built-in Windows command-line tools to make a wireless war driving instrument that can discover vulnerable wireless LANs
* leverage Windows command-line tools to formulate HTTP requests that test web server security
This installment will explore what can happen after the initial vulnerability is compromised and a threat becomes truly invasive – and how to proactively assess your systems against such attacks. To top it off,
the expert will discuss how all of the techniques covered in this trilogy of webcasts can be pulled together into a multistaged penetration test.
If tihs is anything like the previous 2, it should be great,