Back to All Events

Common Penetration Testing Tools, Tactics, and Procedures

  • Corizon Health 103 Powell Court Brentwood, TN, 37027 United States (map)

Penetration tests are designed to show the impact of successfully exploiting a vulnerability or end user. Attackers can take complete control of a Windows domain by establishing full administrative rights to networks resources. This access can then be used to steal your organizations crown jewels, the thing that makes your organization money. This talk will introduce common attack paths used to compromise a domain. Additionally, a brief introduction to the tools used to perform some of these common attacks will be covered. This presentation will conclude by providing information on mitigating or detecting these common attacks. The audience will be provided with an opportunity to ask any questions, even if they’re not related to the presentation.

RUSSEL VAN TUYL

Russel Van Tuyl is a security analyst for Sword & Shield Enterprise Security. His primary role is conducting network vulnerability assessments and penetration tests but also performs web application assessments, firewall configuration audits, wireless assessments, and social engineering. He has more than 10 years of experience in the technical field in roles such as database design, field device support, help desk, IT asset management, programming, and information security.

Sword & Shield Enterprise Security, Inc. is the premier holistic information security service provider.   With solutions designed to meet the needs of a dynamic security and compliance landscape, we deliver evaluation, remediation, and ongoing monitoring and management to ensure your organization maintains the most comprehensive security posture possible.

Sword & Shield Enterprise Security, Inc. is the premier holistic information security service provider. 

With solutions designed to meet the needs of a dynamic security and compliance landscape, we deliver evaluation, remediation, and ongoing monitoring and management to ensure your organization maintains the most comprehensive security posture possible.