Jump to content
begood

Client Side Penetration Testing Methodology

Recommended Posts

Breaching the network perimeter is much more difficult today than a few years ago. Most large enterprises have dedicated security teams running IDSs/IPSs, have network separation and event monitoring and alerting capabilities. This has thus caused a paradigm shift in the way hacking and hence penetration testing needs to be conducted. Hackers now are looking more at the users of the protected network as the attack vector, than the network perimeter itself. User environments are far more complex than a network perimeter. Hackers use browser vulnerabilities, and security threats in plugins such as Flash, ActiveX, Quicktime etc to compromise users remotely. As most of these users have unrestricted access to internal networks and resources in an organization, a hacker can thus penetrate deep into the network, without ever having to break through the perimeter.

In this detailed video lecture, spanning over 2 hours, Dean De Beer talks about Client-side penetration testing methodologies and how it differs from the server and perimeter focused one. You can download the PDF of the talk here. Thanks for Dan Guido for posting this wonderful lecture on his site. I highly recommend SecurityTubers to watch this video!

Client Side Penetration Testing Methodology Primer Tutorial

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...