You're Invited: Penetration Testing Webcast

Pen Testing Perfect Storm VI: "We Love Cisco!" with Ed Skoudis, Joshua Wright, and Kevin Johnson


Date: Wednesday, March 23, 2011
Time: 2PM EDT/ 11AM PDT (GMT -4:00, New York)
> Click here to register
http://ws.coresecurity.com/PerfectStormPartVI.html

*** A recording of the webcast will be sent to everyone who registers, so be sure to sign up even if you can’t make the live session. ***
Networking equipment is a key IT security concern because of its strategic role in isolating systems and data from unauthorized access. An attacker with control over router configuration could gain access to networks that otherwise would be undetectable, while command of a switch could allow them to quietly steal, manipulate and inject data.
During this webcast, security swashbucklers Ed Skoudis, Joshua Wright and Kevin Johnson will return with more penetration testing madness and demonstrate techniques that you can use to proactively assess the security of Cisco networking equipment throughout your organization.
> Click here to register
http://ws.coresecurity.com/PerfectStormPartVI.html
You’ll learn how to …

  • Use XSS vulns and Project Yokoso to discover Cisco-centric management interfaces
  • Abuse web interfaces for infrastructure control
  • Leverage SNMP-to-telnet access escalation for switch pwnage
  • Conduct privilege escalation with switch mirror ports
  • Engage in VLAN hopping for fun and profit
  • Set up your own virtual routing lab for practice and testing

Like all Perfect Storm webcasts, part VI will go beyond simple vulnerability exploitation and show you how to replicate multiple stages of an attack – from identifying and profiling exposed systems to gaining root and gathering data for reporting and remediation.
> Click here to register
http://ws.coresecurity.com/PerfectStormPartVI.html


*** A recording of the webcast will be sent to everyone who registers, so be sure to sign up even if you can’t make the live session. ***