Blog
Apr 27, 2010
Penetration Testing in the Real World
Penetration Testing video by Offensive Security – Real world scenario.
1 min read
[vc_row][vc_column][vc_row_inner][vc_column_inner][vc_column_text]
Penetration Testing in the real world. If you are tired of “Hacking with Netcat” webcasts or “Penetration Testing with RPC DCOM”, then this movie is for you. It’s a quick reconstruction of a Security Audit we preformed over a year ago, replicated in our labs. The video is under 20 minutes long, and highly edited – attacks rarely go as quickly and smoothly as this ! Check it out here :
[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_row_inner parallax_image=”” section=”” full_screen=”” vertical_centering=”” full_width=”” full_height=”” background=”” bg_color_info=”” img=”” parallax=”” parallax_bg_width=”110″ parallax_reverse=”” video=”” bg_type=”” parallax_style=”” bg_image_new=”” layer_image=”” bg_image_repeat=”” bg_image_size=”” bg_cstm_size=”” bg_img_attach=”” parallax_sense=”” bg_image_posiiton=”” animation_direction=”” animation_repeat=”” video_url=”” video_url_2=”” u_video_url=”” video_opts=”” video_poster=”” u_start_time=”” u_stop_time=”” viewport_vdo=”” enable_controls=”” bg_override=”” disable_on_mobile_img_parallax=”” parallax_content=”” parallax_content_sense=”” fadeout_row=”” fadeout_start_effect=”” enable_overlay=”” overlay_color=”” overlay_pattern=”” overlay_pattern_opacity=”” overlay_pattern_size=”” overlay_pattern_attachment=”” multi_color_overlay=”” multi_color_overlay_opacity=”” seperator_enable=”” seperator_type=”” seperator_position=”” seperator_shape_size=”” seperator_svg_height=”” seperator_shape_background=”” seperator_shape_border=”” seperator_shape_border_color=”” seperator_shape_border_width=”” icon_type=”” icon=”” icon_size=”” icon_color=”” icon_style=”” icon_color_bg=”” icon_border_style=”” icon_color_border=”” icon_border_size=”” icon_border_radius=”” icon_border_spacing=”” icon_img=”” img_width=”” ult_hide_row=”” ult_hide_row_large_screen=”” ult_hide_row_desktop=”” ult_hide_row_tablet=”” ult_hide_row_tablet_small=”” ult_hide_row_mobile=”” ult_hide_row_mobile_large=””][vc_column_inner][us_separator size=”custom” height=”32px”][vc_column_text][/vc_column_text][us_separator size=”custom” height=”32px”][/vc_column_inner][/vc_row_inner][vc_row_inner section=”” full_screen=”” vertical_centering=”” full_width=”” full_height=”” background=”secondary” parallax_bg_width=”110″ parallax_reverse=”” video=”” video_opts=”” multi_color_overlay=””][vc_column_inner][us_separator show_line=”1″][vc_column_text]
Looking for something else? Browse all of our Penetration Testing and Professional Services.
[/vc_column_text][us_separator size=”custom” height=”10px”][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row]
Cybersecurity leader resources
Sign up for the Secure Leader and get the latest info on industry trends, resources and best practices for security leaders every other week
Latest from OffSec
Enterprise Security
Red Team vs Blue Team in Cybersecurity
Learn what a red team and blue team in cybersecurity are, pros and cons of both, as well as how they work together.
Dec 13, 2024
13 min read
Enterprise Security
Building a Future-Ready Cybersecurity Workforce: The OffSec Approach to Talent Development
Learn all about our recent webinar “Building a Future-Ready Cyber Workforce: The OffSec Approach to Talent Development”.
Dec 13, 2024
4 min read
Enterprise Security
How to Become the Company Top Cyber Talent Wants to Join
Become the company cybersecurity talent wants to join. Learn how to attract, assess, and retain experts with strategies that set you apart.
Dec 4, 2024
5 min read