| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
This talk is about the Attack Team Automation Tool (ATAT). ll3nigmall wrote this tool to create repeatability and increase efficiency in large scale penetration tests. Are you feeling Vader's impending choke hold when large scopes are handed down with numerous targets and a large number of duplicate exploits to be handled across several disparate targets? Do you receive incomplete vulnerability reports from Qua..I mean, your vulnerability scanners that require you to identify which port each target has the identified service running on? Does your team have to accomplish high volume and high value repeatable penetration tests with industry standard tools at a fraction of the time it would normally take? If the answer to any of these questions is yes, maybe, or just a defeated; then it is time to fire up your brand new ATAT and charge those shield generators like Greedo in a speedo! Yeah, I'm not really sure what that last line was supposed to mean either. Just git clone ATAT. You'll see what I mean! :) Bio: ll3N1GmAll is a lifelong security enthusiast who began his journey back in the days of AOL 2.0/2.5, LuciferX, Methodus Toolz, Lethal Fragment, sub7, etc. He was instantly "Addicted from the start and it wasn,t endin, soon". ll3N1GmAll developed a passion for penetration testing and learning how to make things work; especially things that were never designed to work. Fast forward through times better left undocumented; and as a result, he became a full time penetration tester, co-founder of BSidesSTL, and lock pick village guy thanks to Irongeek & Parameter.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast