Cybersecurity Webinar Part 3/3
During this third webinar we are going to review the "exploitation methodology" used by hackers. We walk through the typical steps in exploitation of the Internet-facing resources such as web applications and infrastructure. The participants would also learn about technical and non-technical tools and techniques used by attackers. We shall touch the subject of preventing software vulnerabilities by integrating security to the software development lifecycle (SDLC).
Agenda:
- The methodology: something similar for hackers and penetration testers
- Reviewing the key steps in exploitation:
- Information discovery
- Target scanning
- Vulnerability assessment
- Exploiting weaknesses
- Privilege escalation and lateral movements
- Retaining access
- Covering tracks
- Non-technical methods: social engineering
- Secure SDLC
- Q&A
Agenda:
- The methodology: something similar for hackers and penetration testers
- Reviewing the key steps in exploitation:
- Information discovery
- Target scanning
- Vulnerability assessment
- Exploiting weaknesses
- Privilege escalation and lateral movements
- Retaining access
- Covering tracks
- Non-technical methods: social engineering
- Secure SDLC
- Q&A