Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
P. 1
Essential Windows Command Line Kung-Fu for InfoSec Pros

Essential Windows Command Line Kung-Fu for InfoSec Pros



|Views: 2,323|Likes:
Published by api-3726247

More info:

Published by: api-3726247 on Oct 15, 2008
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





SANS Webcast © 2006
SANS Institute presents:
Essential Windows Command-LineKung Fu for Info Sec Pros
SpeakersEd Skoudis, Intelguardians
Alexander Horan, Core SecurityTechnologiesQ/A session with today’s speakersSend questions to ‘q@sans.org’ 
Core Security Technologies
46 Farnsworth StBoston, MA 02210Ph: (617) 399-6980www.coresecurity.com
Security Assurance: Vulnerability Assessment,Management and Auditing
Handling Vulnerabilities is Crucial
Scanners are used to detect flaws on the first layer of defense,such as improper configurations or sub-par patch revisions
Good for information assurance and compliance
Vulnerability scanning yields one view of the network topology
Does not show or exploit linkage between information systems andassets
Will not show the impact of loss of information assets (only shows the"outer layer" of the onion) such as theft of intellectual property,leakage of internal communications, etc.
Does not show the true level of threat had the network beencompromised by a motivated adversary
Sample vulnerability scanning products
Nessus, Retina, GFI LanGuard

Activity (25)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
warezisgr8 liked this
rcjay2 liked this
Roger Dion liked this
sniperswat liked this
wanakahalugi liked this
capella liked this
SatishJKale liked this

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->