var _gaq = _gaq || []; _gaq.push(['_setAccount', 'UA-35754314-2']); _gaq.push(['_setDomainName', 'securityeverafter.com']); _gaq.push(['_trackPageview']); (function() { var ga = document.createElement('script'); ga.type = 'text/javascript'; ga.async = true; ga.src = ('https:' == document.location.protocol ? 'https://ssl' : 'http://www') + '.google-analytics.com/ga.js'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(ga, s); })();

Sunday, June 20, 2010

SANS Security 542

I recently attended the SANS Security 542 Web App Penetration Testing and Ethical Hacking
class at SANS Fire. I have to say that this was one of the most energetic SANS classes I have ever taken. Kevin Johnson (hacker princess) did an amazing job of keeping the class engaged and on track. There were a bunch of hands on labs every day, which helped reinforce the material we covered. It also prepared the student for the day 6 Capture the Flag exercises.

In the class I extensively used the Samurai Web Testing Framework (WTF). The great part of this platform is that I became very familiar with its use during the class. The wise student will take Samurai WTF  back to work to help identify the holes that may exist in their own environment before someone else does.

No comments:

Post a Comment