A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Adding Simulated Users to Your Pentesting Lab with PowerShell - Chris Myers and Barrett Adams (BSides Tampa 2018) (Hacking Illustrated Series InfoSec Tutorial Videos)

Adding Simulated Users to Your Pentesting Lab with PowerShell
Chris Myers and Barrett Adams
BSides Tampa 2018

Abstract: Pentesting labs tend to have isolated boxes representing specific vulnerabilities. This doesn,t do a great job of mimicking real world networks which have active users and network activity. We've created a tool set to introduce simulated users to a lab environment which enables us to accurately model real world corporate networks and allows for additional attack vectors to be explored in a safe setting. During this talk we,ll go over the major functions of the tool and showcase its capabilities with a live demonstration.

Bio: Chris and Barrett are both penetration testers with significant experience hacking internal networks across a broad range of industries. In addition both have performed assessments of web and mobile applications, external networks, and launched end to end spear phishing campaigns.

Back to BSides Tampa 2018 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast