Full session (30 minutes)
security
hacking

Red teaming, pentesting, white box testing – many definitions and even more ways to conduct these tests, but how they help in the ultimate decision if the product requires additional investments? This paper will deep dive into a real attack executed by a red team against a multi-layer product. All the cool hacks leading from XML-RPC interface to root access act as a mere excuse for discussing:

  • where the different tests fail and succeed in finding vulnerabilities
  • what the tests tell about the risks estimation
  • how to achieve actionable results
  • how to benefit from the results reported

Pawel Krzywicki