article thumbnail

Security BSides Dublin 2021 – Jayme Hancock’s ‘Weaponizing Systems Administration: Leveraging IT Skills In Penetration Testing’

Security Boulevard

The post Security BSides Dublin 2021 – Jayme Hancock’s ‘Weaponizing Systems Administration: Leveraging IT Skills In Penetration Testing’ appeared first on Security Boulevard.

article thumbnail

Security BSides Dublin 2021 – Jayme Hancock’s ‘Weaponizing Systems Administration: Leveraging IT Skills In Penetration Testing’

Security Boulevard

The post Security BSides Dublin 2021 – Jayme Hancock’s ‘Weaponizing Systems Administration: Leveraging IT Skills In Penetration Testing’ appeared first on Security Boulevard. Our thanks to Security BSides Dublin for publishing their outstanding videos on the organization's YouTube channel.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

9 Best Penetration Testing Tools for 2022

eSecurity Planet

A penetration test , or pen test, is the simulation of a cyber attack. This critical IT security practice isn’t the same as a vulnerability assessment or vulnerability scanning, though, as pen testing involves an actual attack similar to what hackers would do in real-world conditions. Best Pen Testing Frameworks.

article thumbnail

How to use Zarp for penetration testing

Tech Republic Security

Network or systems administrators must conduct pen testing to discover any possible security weaknesses. Find out why Zarp is a very powerful pen-testing tool to have at your disposal.

article thumbnail

Here is why you should have Cobalt Strike detection in place

CSO Magazine

Google recently released a list of YARA detection rules for malicious variants of the legitimate Cobalt Strike penetration testing framework that are being used by hackers in the wild. Living off the land is a common tactic.

article thumbnail

15 Top Cybersecurity Certifications for 2022

eSecurity Planet

The certification covers active defense, defense in depth, access control, cryptography, defensible network architecture and network security, incident handling and response, vulnerability scanning and penetration testing, security policy, IT risk management, virtualization and cloud security , and Windows and Linux security.

article thumbnail

Red Team vs Blue Team vs Purple Team: Differences Explained

eSecurity Planet

Blue teams consist of security analysts, network engineers and system administrators. These members may be led by a director of penetration testing or a senior security consultant and be organized in sub-teams based on the type of testing they are performing.