Share to Facebook Share to Twitter Share to LinkedIn

Under the Hoodie: Actionable Research from Penetration Testing Engagements

Watch On-Demand Today 

Uncover the major findings from Rapid7's latest research "Under the Hoodie: Actionable Research from Penetration Testing Engagements." We shed light on the "dark art" by revealing the process, techniques, and tools that go into pen testing.

In this webcast, Andrew Whitaker and Tod Beardsley will cover the major findings from our latest research, including the vulnerabilities and misconfigurations most often found on our engagements, the effects of account lockouts and two-factor authentication on pen testers, and the most effective countermeasures you can take to detect and prevent criminal hackers from breaking into your network.

Speakers: Andrew Whitaker, Director of Global Services, Rapid7 and Tod Beardsley, Director of Research, Rapid7

Fill out the form to register for the webcast and receive a copy of the research report

Under the Hoodie: Actionable Research from Penetration Testing Engagements



Watch On-Demand Today 

Uncover the major findings from Rapid7's latest research "Under the Hoodie: Actionable Research from Penetration Testing Engagements." We shed light on the "dark art" by revealing the process, techniques, and tools that go into pen testing.

In this webcast, Andrew Whitaker and Tod Beardsley will cover the major findings from our latest research, including the vulnerabilities and misconfigurations most often found on our engagements, the effects of account lockouts and two-factor authentication on pen testers, and the most effective countermeasures you can take to detect and prevent criminal hackers from breaking into your network.

Speakers:
Andrew Whitaker
Director of Global Services
Rapid7
Tod Beardsley
Director of Research
Rapid7

About the Research Report

In our latest research paper, “Under the Hoodie: Actionable Research from Penetration Testing Engagements,” we shed light on the “dark art” by revealing the process, techniques, and tools that go into it, as well as the insights you can expect to come out. Based on the results of 100+ pen tests, as well as the real-world experiences of our engineers and investigators, our research reveals the most commonly exploited vulnerabilities, the most commonly leveraged network misconfigurations, and the most effective methods we've found to compromise high-value credentials—all to determine countermeasures you can take to best detect and prevent the truly sinister folks from breaching your network.

By registering for our webcast, you will receive an instant copy of the research report.