{"id":1852,"date":"2016-12-17T22:27:28","date_gmt":"2016-12-17T22:27:28","guid":{"rendered":"https:\/\/zed.inguardians.com\/?p=1852"},"modified":"2019-08-02T13:17:19","modified_gmt":"2019-08-02T20:17:19","slug":"secrets-of-americas-top-pentesters","status":"publish","type":"post","link":"https:\/\/zed.inguardians.com\/presentations\/secrets-of-americas-top-pentesters\/","title":{"rendered":"Secrets of America\u2019s Top Pentesters"},"content":{"rendered":"

Authored by Co-Founder and senior security analyst Ed Skoudis, this presentation covers some little-known but extremely helpful technical and procedural tips for maximizing the effectiveness of pen tests. These secrets can help testers save huge amounts of time, improve the likelihood of successful compromise, and lower the chance of negatively impacting target systems during a test. Based on experiences learned from in-the-trenches tests by a dozen pen testers over the past year, Ed examines crucial secrets associated with scanning, password attacks, exploitation, and many other aspects that readers will be able to apply immediately in their own penetration testing regimen.<\/p>\n

https:\/\/inguardians.box.com\/shared\/static\/x1r56o6pkg0m9gbqlgxzfmqnezsnwfb2.pdf<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"

Authored by Co-Founder and senior security analyst Ed Skoudis, this presentation covers some little-known but extremely helpful technical and procedural tips for maximizing the effectiveness of pen tests. These secrets can help testers save huge amounts of time, improve the likelihood of successful compromise, and lower the chance of negatively impacting target systems during a […]<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[51],"tags":[120,121,128,17,18,108,86,97,103,98,74],"_links":{"self":[{"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/posts\/1852"}],"collection":[{"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/comments?post=1852"}],"version-history":[{"count":3,"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/posts\/1852\/revisions"}],"predecessor-version":[{"id":3187,"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/posts\/1852\/revisions\/3187"}],"wp:attachment":[{"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/media?parent=1852"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/categories?post=1852"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/tags?post=1852"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}