Zen and the Art of an Internal Penetration Testing Program: Part 1
|Event Date/Time: Mar 19, 2009||End Date/Time: Mar 19, 2009|
It will answer questions such as
* Why do I need to perform internal penetration testing?
* What systems and applications should I be testing?
We will cover getting permission, how to best work with your system and network administrators, goals of testing, and defining rules of engagement and scope. Tips and tricks will be offered, including using Nmap for host identification and enumeration, scripting Nmap using the Nmap Scripting Engine for more advanced testing, and using ndiff to compare Nmap scan results.