Seek Out New Protocols, and Boldly Go Where No One has Gone Before!
1.2 هزار بار بازدید -
3 هفته پیش
-
Join me with guest "Doug
Join me with guest "Doug McKee" for the following session:
The deep enumeration methodology for product security testing, which involves dissecting and comprehending proprietary protocols, is crucial for protecting and testing our organizations. This presentation will outline a clear and repeatable methodology and demonstrate, using an actual proprietary protocol, how to dissect and understand it. We'll also explore how threat actors can exploit these protocols. Finally, the presentation will conclude by showing how defenders can leverage this deep understanding to mitigate the risks posed by proprietary protocols in their networks.
Follow Doug on X at @fulmetalpackets
Check out the Python script used during the stream here: github.com/fulmetalpackets?tab=repositories
3 هفته پیش
در تاریخ 1403/06/09 منتشر شده
است.
1,209
بـار بازدید شده