Overview
Syllabus
Introduction
What is a Pentest
External vs Internal
Pentest Team
Engagement
Security
scoping call
system
report
walkthrough
internal systems
developer shop
final reports
easy to find issues
business logic flaws
how do you optimize
checklists
evangelize
no more fancy tools
easy to use
what is hunter
what is hunter not
SSL Versions
ILook Architecture
Frontend UI
HTTP endpoint
Local host
Test Site
Security Headers
MidLevel Rating
Headers
Policy
Scoring Model
CSP Policy
Cipher List
Legacy Applications
Pentest Results
Impact of Prereqs
More Slides
Future Plans
Outro
Taught by
OWASP Foundation