Learn, hack!

Hacking and security documentation: slides, papers, video and audio recordings. All in high-quality, daily updated, avoiding security crap documents. Spreading hacking knowledge, for free, enjoy. Follow on .

How to Detect Penetration Testers

Type
Slides
Tags
IDS, network
Authors
Ron Gula
Event
Source Conference Boston 2010
Indexed on
Mar 26, 2013
URL
http://www.sourceconference.com/bos10pubs/10-04-SOURCE-DetectingPenTesters.pptx
File name
10-04-SOURCE-DetectingPenTesters.pptx
File size
3.9 MB
MD5
d180190a4e9b8fac4950322a2dbf7bdb
SHA1
25a5aefc1b84ff9a5dc0fcf366ab85f3c3da7547

n this talk we will examine the problem of detecting authorized penetration testers from a variety of technical and political aspects. One on hand, we need to monitor and protect from many threats, but politically, we also don't want to have the pen test team make your security monitoring, your SIM or your NIDS look like a joke. Attendees will quickly realize that the tips and insights for making better use of firewall logs, netflow, systems logs and so on can and should be applied to monitoring for real bad guys as well.

About us

Secdocs is a project aimed to index high-quality IT security and hacking documents. These are fetched from multiple data sources: events, conferences and generally from interwebs.

Statistics

Serving 8166 documents and 531.0 GB of hacking knowledge, indexed from 2419 authors from 163 security conferences.

Contribute

To support this site and keep it alive, you can click on the buttons below. Any help is really appreciated! This service is provided for free, but real money is needed to pay bills.

Flattr this Click here to lend your support to: Keep live SecDocs for an year and make a donation at www.pledgie.com !