Five Pentesting Tools and Techniques (That Every Sysadmin Should Know) by Jeremy Trinka

(176 views)

Step into the mind of a pentester. It’s Friday afternoon, somewhere around 2PM. The sound of whirring laptops is drowned out by your earbuds blasting the most aggressive music you have synced to your smartphone. That hash you captured hasn’t cracked, and your machine has been running since early Tuesday. The second energy drink you pounded down this afternoon hits the rim of the trashcan. The sterile business casual attire you’re being forced to wear is becoming noticeably less breathable as the frustration builds inside of you. It’s a couple of hours away from time to wrap up the engagement and provide the client with a verbal overview of your findings, but you don’t want to step into the office without capturing that flag. Take a deep breath. It’s time to zoom out, get back to basics, and re-assess the environment. In the days of Backtrack and early Kali Linux,....

April 12, 2019
Subscribe
Notify of
guest
1 Comment
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.
What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4

Name(Required)

We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.