Skip to Content
Cybersecurity Blue Team Toolkit
book

Cybersecurity Blue Team Toolkit

by Nadean H. Tanner
April 2019
Beginner to intermediate
288 pages
7h 20m
English
Wiley
Content preview from Cybersecurity Blue Team Toolkit

CHAPTER 12Patch and Configuration Management

WHAT YOU WILL LEARN IN THIS CHAPTER:

  • Patch Management
  • ManageEngine Desktop Central
  • Configuration Management
  • Clonezilla live

I had so much fun this past October at the Wild West Hacking Fest (WWHF) in South Dakota. Conferences are a great way to connect to people who share the same interests as you, and when you get all that intelligence and weirdness in the same room, it's just phenomenal. I've been to BlackHat, DefCon, and BSides, but the WWHF by far has been the most hands‐on con I've ever had the pleasure of attending. Any conference you attend and find yourself with James Lee (aka Egypt), the author of many Metasploit exploits, and Johnny Long, the original Google Dork, sitting across the table from you working on the same hack is a conference that you put on your agenda for the next year. Ed Skoudis was the keynote speaker and was able to give us the backstory to WebExec, the vulnerability in Cisco's WebEx client software. Ed's team at CounterHack discovered the vulnerability in July 2018 and worked with Cisco's PSIRT team to remediate. He was able to discuss the advisory at the conference on October 24, the day of his keynote speech.

One of the best things about the WWHF is that all the talks are online. If you can't get to South Dakota, you can still listen to all the talks given by subject‐matter experts. Ed's keynote topic was the “Top 10 Reasons It's GREAT to Be a PenTester.” Number 9 was Java and Adobe Flash. They are ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Cybersecurity Attacks- Red Team Strategies

Cybersecurity Attacks- Red Team Strategies

Johann Rehberger

Publisher Resources

ISBN: 9781119552932Purchase book