Penetration Tester Pen Test Partners, United Kingdom
Follow a penetration tester through the key stages of an engagement, from preparation to successful execution. Step-by-step, we’ll show you how someone can achieve total domain takeover within 30 minutes of entering a target’s building. Explore the preparation stages, in particular how to use OSINT, and view a demonstration of practical reconnaissance techniques. You’ll discover how shadow technology and building facilities can be used to bypass firewalls and provide a foothold onto a network. Learn how bad actors bypass physical security controls and leverage common vulnerabilities.
Learning Objectives:
Identify and mitigate common network and server vulnerabilities in order to prevent privilege escalation attacks.
Apply your knowledge of a social engineer’s methodology to prevent common reconnaissance techniques.
Explain how to detect and mitigate the use of lesser-known attack vectors to breach firewalls.