Back to Results
First PageMeta Content
Computer security / Domain name system / Footprinting / Computer network security / Internet standards / Black Hat Briefings / Reverse DNS lookup / Penetration test / Domain / Computing / Internet protocols / Internet


SensePost How far can automation be taken? How much intelligence can be embodied in code? How generic can automated IT security assessment tools really be? This presentation will attempt to show which areas of attacks l
Add to Reading List

Document Date: 2014-12-16 19:06:36


Open Document

File Size: 1,30 MB

Share Result on Facebook

Company

IBM / Google / VMWare / SensePost / /

Continent

Asia / Europe / Africa / /

Country

Netherlands / /

Facility

Rand Afrikaans University / British Institute of Standards / University of Heidelberg / /

IndustryTerm

web servers / printing / web proxy / large network / automated assessment tool / released several tools / large networks / security assessment tools / /

OperatingSystem

Unix / /

Organization

University of Heidelberg in Germany / British Institute of Standards in London / Rand Afrikaans University / /

Person

ARIN RIPE APNIC LACNIC AFRINIC / All / Haroon Meer / /

Position

keynote speaker / speaker / Technical Director / external penetration specialist / speaker at The Black Hat Briefings / Director of Development / regular speaker / accredited BS7799 Lead Auditor / forward / /

Technology

DNS / Unix / PERL / GUI / /

SocialTag