Black Hat USA 2014 - CloudBots - Harvesting Crypto Coins like a Botnet Farmer
In this presentation, we explore how to (ab)use free trials to get access to vast amounts of computing power, storage, and pre-made hacking environments.
In this presentation, we explore how to (ab)use free trials to get access to vast amounts of computing power, storage, and pre-made hacking environments.
Bishop Fox Adversarial Controls Testing Methodology
Download our methodology document to learn about our adversarial, attack-based approach to testing your key security controls.
The Offensive Security Blueprint for Technology & Software
Cosmos Datasheet
Learn how Cosmos combines attack surface management with expert-driven penetration testing to help security teams identify and remediate dangerous exposures before attackers can exploit them. |
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.