Penetration testing demo and walkthrough | Infosec Edge Webcast

Поделиться
HTML-код
  • Опубликовано: 25 янв 2025

Комментарии • 5

  • @uendarkarplips7263
    @uendarkarplips7263 3 года назад +2

    Using sed and awk really is a game changer when it comes to managing all of the raw data from a pentest.

  • @lt3lt3lt3
    @lt3lt3lt3 3 года назад +1

    "He wants to know what tool you're using right now" I lol'd

  • @jaeger4763
    @jaeger4763 Год назад

    7:09 How can we know which range ?

  • @uendarkarplips7263
    @uendarkarplips7263 3 года назад +1

    The only issue I see with this is the "covering your tracks and deleting logs" aspect of the "pentest." I would never delete anything from a client system. Deleting customer data is no beuno, unless it's something you put there in an effort to clean up after yourself at the end of the engagement.

  • @parker4878
    @parker4878 3 года назад +1

    Great video.