Threat and vulnerability management

Threat and vulnerability management

Pulling Back the Curtain

  • Travis Finn
Threat and vulnerability management

Introducing Slackor, a Remote Access Tool Using Slack as a C2 Channel

  • Esteban Rodriguez
Threat and vulnerability management

Fuzzing: Common Tools and Techniques

  • Andy Bowden
Threat and vulnerability management

pymetasploit3 – Metasploit Automation Library

  • Dan McInerney
Threat and vulnerability management

The Death Metal Suite

  • Victor Teissler
Threat and vulnerability management

High-Power Hash Cracking with NPK

  • Brad Woodward
Threat and vulnerability management

“Password Spraying”—What to Do and How to Avoid It

  • Bob Post