Learn Excel & Financial Modeling the Way Finance Teams Actually Use Them
Free courses from frontend to fullstack and AI
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore a critical analysis of conventional penetration testing methodologies in this 20-minute conference talk from DefCamp 2019. Delve into the limitations and shortcomings of typical pentests, examining various attack vectors such as spearphishing, password exploitation, flash drive vulnerabilities, intranet weaknesses, and physical security risks like lockpicking and tailgating. Learn why these common approaches may fall short in providing comprehensive security assessments and gain insights into more effective strategies for identifying and addressing potential vulnerabilities in organizational cybersecurity.
Syllabus
Intro
Who am I
Phone calls
spearfishing
passwords
flash drives
intranet
trash diving
lockpicking
tailgating
summary
QA
Taught by
DefCamp