These in-depth, technical presentations by Ed Skoudis look at the art and science of using penetration testing to gain visibility into your organization’s security posture.
— Part I: A brief introduction to the value of penetration testing + an overview of pen testing techniques using the Windows command shell.
— Part II: An introduction to techniques for performing the functions of Netcat – such as moving files, scanning ports and creating backdoors – without using Netcat.
— Part III: This installment explores what can happen after the initial vulnerability is compromised and a threat becomes truly invasive – and how to proactively assess your systems against such attacks.
> Click here to access the “Penetration Testing Ninjitsu” series: