| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
As the targets in many penetration tests and red team activities as well as being the focus of much of the active research being performed in the InfoSec arena, Windows takes center stage. However, we are not going to be talking about Windows; we are here to discuss Unix (and Unix like OSes). While these systems can and do contain some of the most critical information on many networks, we feel they do not get enough time in the spotlight. So, if you want to learn a bit more about Unix and what you can do to/with it as a pentester, then please stop by and have a listen. Adam Compton has been a programmer, researcher, professional pentester, father, husband, and farmer. Adam has around 2 decades of programming, network security, incident response, security assessment, and penetration testing experience. Throughout Adam's career, he has worked for both federal and international government agencies as well as within various aspects of the private sector. David Boyd (@fir3d0g) is a security analyst for TrustedSec. He is a Christian, husband, and father that also enjoys geek culture, video games, and Mountain Dew. He has over 15 years of technical experience in several environments including education, military, retail, government, media, law firms, and hospitals learning something from each one along the way. He also once found Waldo and Carmen Sandiego.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast