Using OWASP Tools by Aaron Guzman, Principal Penetration Testing Consultant, Dell SecureWorks (http://sched.
These independent researchers covered everything from Android application attacks to collaborative pentesting
and forensic evidence collection.
Because of this gap between supply and demand of professionals with sophisticated penetration testing skills, EC-Council and Inflow Technologies worked closely to offer in India security training classes designed to boost the quality of penetration testers through a fully hands-on and highly technical pentesting
course on live virtual systems.
Their newly released Enterprise Pentesting
Appliance (EPA) enables coverage to large numbers of remote offices, persistent pentesting
functionality and centralized management capabilities.
code review (outsourced or home-based) pentesting
(system penetration tests, usually outsourced) Web application firewall
From Android application attacks and exploits of injection flaws, to collaborative pentesting
and open source forensic evidence collection -- the Arsenal is packed with live tools.
Black Hat Arsenal returned for its sixth year, offering researchers and the open source community a venue to demonstrate tools they develop and use in their daily professions -- from visualization and phishing to collaborative analysis and pentesting
The SINET Showcase will feature Pwnie Express's Pwn Pulse solution, which provides consolidated asset discovery, vulnerability scanning, and pentesting
in a single unified offering.
This year's event featured 12 tools, showing off a broad assortment of tools from visualization and phishing to collaborative analysis and pentesting
with Netcat Master Netcat's port scanning and service identification capabilities as well as obtaining Web server application information.
Josh Abraham's training session: Pentesting
with Perl, July 27, 2010, 9:00 a.
An end-to-end security assessment solution designed specifically for hard-to-reach distributed remote sites, Pwn Pulse delivers real-time wired and wireless asset discovery, continuous vulnerability scanning, pentesting
, risk trending and alerting.