B3b77c251676bac703c9080921f5fc78

Abstract

List the technical steps which might be important while doing the information gathering of an organization with limited info like company name or it’s domain..

Suppose, we have to do a external/ internal pentest of a big organization with DMZ, Data centers, Telecom network etc. We can either do Passive fingerprinting (method to learn more about the enemy, without them knowing it) or Active fingerprinting (process of transmitting packets to a remote host and analyzing corresponding replies).

Speaker

Vijay Kumar

Timing

Starts at Saturday April 22 2017, 10:10 AM. The sessions runs for about 6 hours.

Resources