SlideShare a Scribd company logo
1 of 11
Download to read offline
CONNECT	
  2017	
  
Tips	
  and	
  Tricks	
  
Vulnerability	
  Insight	
  Track
L E A R N M O R E
Magno Gomes
SE	
  Manager,	
  Core	
  Security
• 15+	
  Years	
  as	
  a	
  SE	
  in	
  Network	
  &	
  Security
• 7+	
  Years	
  @	
  Core	
  Security
• Came	
  from	
  the	
  Core	
  Security	
  Acquisition
• IMPACT,	
  VI	
  &	
  NI	
  Specialist	
  
Vulnerability	
  Insight	
  Tips	
  &	
  Tricks
During	
  this	
  Session:
• Live	
  Walkthrough	
  of	
  some	
  configuration	
  considerations
• 5-­‐10	
  Minutes	
  in	
  each	
  section
• Q	
  &	
  A	
  after	
  each	
  Section
• Final	
  Q&A	
  on	
  general	
  configuration	
  or	
  the	
  product	
  in	
  general
• If	
  need	
  we	
  can	
  review	
  particular	
  areas
AGENDA
• Using	
  the	
  Analytics	
  Tab
• Campaign	
  Tips
• Attack	
  Path	
  Review
• Fine	
  Tuning	
  Attack	
  Strategies
• Live	
  vs.	
  Manual	
  Pen	
  Test
Using	
  the	
  Analytics	
  Tab
Subtitle	
  left
• Creating/Saving	
  Filters
• Tracking	
  <daily,	
  weekly,	
  monthly	
  
scans>
• How	
  to	
  omit	
  older	
  data	
  using	
  filters	
  
and	
  apply	
  to	
  campaigns
• Attack	
  Path	
  viewing	
  (where	
  to	
  begin)
• ***	
  Adding/changing	
  the	
  asset	
  
schema	
  to	
  adjust	
  to	
  more	
  fields	
  to	
  
filter	
  by	
  and/or	
  use	
  for	
  dynamic	
  
targets
Campaign	
  Tips
• Review	
  of	
  Tagging	
  and	
  how	
  to	
  use	
  it	
  to	
  properly	
  show	
  on	
  
Dashboards
• Rule	
  of	
  Thumb	
  on	
  when	
  a	
  campaign	
  should	
  run	
  after	
  scan	
  data	
  
updated
Attack	
  Path	
  Review
Subtitle	
  left
• How	
  to	
  pinpoint/isolate	
   the	
  
attack	
  paths	
  on	
  large	
  
network	
  diagrams
• Where	
  to	
  find	
  info	
  on	
  Attack	
  
Path	
  campaigns	
  without	
  
generating	
  a	
  report
Fine	
  Tuning	
  Attack	
  Strategies
Subtitle	
  left
• Which	
  options	
  should	
  be	
  used?
• How	
  many	
  should	
  be	
  created?
• Most	
  Frequent	
  settings	
  used:
• How	
  to	
  track/find	
  a	
  specific	
  CVE(s)
• Low	
  Hanging	
  Fruit
Live	
  vs	
  Manual	
  Pen	
  Test
Subtitle	
  left
• What	
  should	
  I	
  use	
  Live
or	
  manual	
  Pentest?
• Quickly	
  executing	
  a	
  PT	
  
and	
  how
• Things	
  to	
  Know
Q 	
   & 	
   A
THANK	
  YOU

More Related Content

Similar to Vulnerability Insight Tips & Tricks - Magno Gomes SE Manager, Core Security

Success recipe for new IT projects-Agile way. Fail Fast, Fail Early
Success recipe for new IT projects-Agile way. Fail Fast, Fail EarlySuccess recipe for new IT projects-Agile way. Fail Fast, Fail Early
Success recipe for new IT projects-Agile way. Fail Fast, Fail Early
Joseph Vargheese PMP CSM CSP
 
Fiksu presentation a User Acquisition for Mobile Games: Strategies to Test an...
Fiksu presentation a User Acquisition for Mobile Games: Strategies to Test an...Fiksu presentation a User Acquisition for Mobile Games: Strategies to Test an...
Fiksu presentation a User Acquisition for Mobile Games: Strategies to Test an...
Fiksu
 

Similar to Vulnerability Insight Tips & Tricks - Magno Gomes SE Manager, Core Security (20)

Success recipe for new IT projects-Agile way. Fail Fast, Fail Early
Success recipe for new IT projects-Agile way. Fail Fast, Fail EarlySuccess recipe for new IT projects-Agile way. Fail Fast, Fail Early
Success recipe for new IT projects-Agile way. Fail Fast, Fail Early
 
SCRIMPS-STD: Test Automation Design Principles - and asking the right questions!
SCRIMPS-STD: Test Automation Design Principles - and asking the right questions!SCRIMPS-STD: Test Automation Design Principles - and asking the right questions!
SCRIMPS-STD: Test Automation Design Principles - and asking the right questions!
 
Experimentation Platform at Netflix
Experimentation Platform at NetflixExperimentation Platform at Netflix
Experimentation Platform at Netflix
 
Governance is Not An Option
Governance is Not An OptionGovernance is Not An Option
Governance is Not An Option
 
How to Master your Marketing Data - Cody Crumrine, Data Aptitude
How to Master your Marketing Data - Cody Crumrine, Data AptitudeHow to Master your Marketing Data - Cody Crumrine, Data Aptitude
How to Master your Marketing Data - Cody Crumrine, Data Aptitude
 
Fiksu presentation a User Acquisition for Mobile Games: Strategies to Test an...
Fiksu presentation a User Acquisition for Mobile Games: Strategies to Test an...Fiksu presentation a User Acquisition for Mobile Games: Strategies to Test an...
Fiksu presentation a User Acquisition for Mobile Games: Strategies to Test an...
 
Conferences i/o Features to implement NASBA CPE Standards
Conferences i/o Features to implement NASBA CPE StandardsConferences i/o Features to implement NASBA CPE Standards
Conferences i/o Features to implement NASBA CPE Standards
 
DevSecCon London 2017: Shift happens ... by Colin Domoney
DevSecCon London 2017: Shift happens ... by Colin Domoney DevSecCon London 2017: Shift happens ... by Colin Domoney
DevSecCon London 2017: Shift happens ... by Colin Domoney
 
Integration strategies best practices- Mulesoft meetup April 2018
Integration strategies   best practices- Mulesoft meetup April 2018Integration strategies   best practices- Mulesoft meetup April 2018
Integration strategies best practices- Mulesoft meetup April 2018
 
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck HubFLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
 
Production and Beyond: Deploying and Managing Machine Learning Models
Production and Beyond: Deploying and Managing Machine Learning ModelsProduction and Beyond: Deploying and Managing Machine Learning Models
Production and Beyond: Deploying and Managing Machine Learning Models
 
How to Use Data to Drive Product Decisions by PayPal PM
How to Use Data to Drive Product Decisions by PayPal PMHow to Use Data to Drive Product Decisions by PayPal PM
How to Use Data to Drive Product Decisions by PayPal PM
 
Is Test Planning a lost art in Agile? by Michelle Williams
Is Test Planning a lost art in Agile? by Michelle WilliamsIs Test Planning a lost art in Agile? by Michelle Williams
Is Test Planning a lost art in Agile? by Michelle Williams
 
Maximize the Power of Your ERP Data
Maximize the Power of Your ERP DataMaximize the Power of Your ERP Data
Maximize the Power of Your ERP Data
 
Continuous Performance Testing: The New Standard
Continuous Performance Testing: The New StandardContinuous Performance Testing: The New Standard
Continuous Performance Testing: The New Standard
 
Visual studio 2015 - Application Insights
Visual studio 2015 - Application InsightsVisual studio 2015 - Application Insights
Visual studio 2015 - Application Insights
 
2015 02 24 lmtv baselining
2015 02 24 lmtv baselining2015 02 24 lmtv baselining
2015 02 24 lmtv baselining
 
Setting Yourself up for Success: Building an Analytics Schema and Data Dictio...
Setting Yourself up for Success: Building an Analytics Schema and Data Dictio...Setting Yourself up for Success: Building an Analytics Schema and Data Dictio...
Setting Yourself up for Success: Building an Analytics Schema and Data Dictio...
 
Usage Trend Reporting
Usage Trend Reporting Usage Trend Reporting
Usage Trend Reporting
 
Advancing Testing Program Maturity in your organization
Advancing Testing Program Maturity in your organizationAdvancing Testing Program Maturity in your organization
Advancing Testing Program Maturity in your organization
 

More from Core Security

More from Core Security (20)

How to Solve the Top 3 Struggles with Identity Governance and Administration ...
How to Solve the Top 3 Struggles with Identity Governance and Administration ...How to Solve the Top 3 Struggles with Identity Governance and Administration ...
How to Solve the Top 3 Struggles with Identity Governance and Administration ...
 
Lazy Penetration Tester Tricks
Lazy Penetration Tester Tricks Lazy Penetration Tester Tricks
Lazy Penetration Tester Tricks
 
Thanks for All the Phish: Introducing Core Impact 18.1
Thanks for All the Phish: Introducing Core Impact 18.1Thanks for All the Phish: Introducing Core Impact 18.1
Thanks for All the Phish: Introducing Core Impact 18.1
 
Identity + Security: Welcome to Your New Career
Identity + Security: Welcome to Your New Career Identity + Security: Welcome to Your New Career
Identity + Security: Welcome to Your New Career
 
Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...
Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...
Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...
 
No More SIlos: Connected Security - Mike Desai and Ryan Rowcliffe
No More SIlos: Connected Security - Mike Desai and Ryan RowcliffeNo More SIlos: Connected Security - Mike Desai and Ryan Rowcliffe
No More SIlos: Connected Security - Mike Desai and Ryan Rowcliffe
 
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
 
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
 
Threat Dissection - Alberto Soliño Testa Research Director, Core Security
Threat Dissection - Alberto Soliño Testa Research Director, Core SecurityThreat Dissection - Alberto Soliño Testa Research Director, Core Security
Threat Dissection - Alberto Soliño Testa Research Director, Core Security
 
How to Defeat the Vulnerability Hydra - Andy Nickel Sales Engineer, Core Secu...
How to Defeat the Vulnerability Hydra - Andy Nickel Sales Engineer, Core Secu...How to Defeat the Vulnerability Hydra - Andy Nickel Sales Engineer, Core Secu...
How to Defeat the Vulnerability Hydra - Andy Nickel Sales Engineer, Core Secu...
 
Understanding Network Insight Integrations to Automate Containment and Kick S...
Understanding Network Insight Integrations to Automate Containment and Kick S...Understanding Network Insight Integrations to Automate Containment and Kick S...
Understanding Network Insight Integrations to Automate Containment and Kick S...
 
Product Vision - Stephen Newman – SecureAuth+Core Security
Product Vision - Stephen Newman  – SecureAuth+Core Security Product Vision - Stephen Newman  – SecureAuth+Core Security
Product Vision - Stephen Newman – SecureAuth+Core Security
 
The Good, the Bad, and The Not So Bad: Tracking Threat Operators with Our Thr...
The Good, the Bad, and The Not So Bad: Tracking Threat Operators with Our Thr...The Good, the Bad, and The Not So Bad: Tracking Threat Operators with Our Thr...
The Good, the Bad, and The Not So Bad: Tracking Threat Operators with Our Thr...
 
Introducing Core Role Designer - Michael Marks Product Manager - Identity, Co...
Introducing Core Role Designer - Michael Marks Product Manager - Identity, Co...Introducing Core Role Designer - Michael Marks Product Manager - Identity, Co...
Introducing Core Role Designer - Michael Marks Product Manager - Identity, Co...
 
Core Connector API Demo - Michael Marks Product Manager - Identity, Core Secu...
Core Connector API Demo - Michael Marks Product Manager - Identity, Core Secu...Core Connector API Demo - Michael Marks Product Manager - Identity, Core Secu...
Core Connector API Demo - Michael Marks Product Manager - Identity, Core Secu...
 
Access Assurance Suite Tips & Tricks - Lisa Lombardo Principal Architect Iden...
Access Assurance Suite Tips & Tricks - Lisa Lombardo Principal Architect Iden...Access Assurance Suite Tips & Tricks - Lisa Lombardo Principal Architect Iden...
Access Assurance Suite Tips & Tricks - Lisa Lombardo Principal Architect Iden...
 
The Why - Keith Graham, CTO – SecureAuth+Core Security
The Why - Keith Graham, CTO – SecureAuth+Core Security The Why - Keith Graham, CTO – SecureAuth+Core Security
The Why - Keith Graham, CTO – SecureAuth+Core Security
 
Network Insight: How To Assess Findings - Tier 1 SOC Triage - Mark Gilbert ,T...
Network Insight: How To Assess Findings - Tier 1 SOC Triage - Mark Gilbert ,T...Network Insight: How To Assess Findings - Tier 1 SOC Triage - Mark Gilbert ,T...
Network Insight: How To Assess Findings - Tier 1 SOC Triage - Mark Gilbert ,T...
 
10 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 201610 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 2016
 
Trending it security threats in the public sector
Trending it security threats in the public sectorTrending it security threats in the public sector
Trending it security threats in the public sector
 

Recently uploaded

TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
mohitmore19
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
anilsa9823
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 

Recently uploaded (20)

Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 

Vulnerability Insight Tips & Tricks - Magno Gomes SE Manager, Core Security

  • 1. CONNECT  2017   Tips  and  Tricks   Vulnerability  Insight  Track
  • 2. L E A R N M O R E Magno Gomes SE  Manager,  Core  Security • 15+  Years  as  a  SE  in  Network  &  Security • 7+  Years  @  Core  Security • Came  from  the  Core  Security  Acquisition • IMPACT,  VI  &  NI  Specialist  
  • 3. Vulnerability  Insight  Tips  &  Tricks During  this  Session: • Live  Walkthrough  of  some  configuration  considerations • 5-­‐10  Minutes  in  each  section • Q  &  A  after  each  Section • Final  Q&A  on  general  configuration  or  the  product  in  general • If  need  we  can  review  particular  areas
  • 4. AGENDA • Using  the  Analytics  Tab • Campaign  Tips • Attack  Path  Review • Fine  Tuning  Attack  Strategies • Live  vs.  Manual  Pen  Test
  • 5. Using  the  Analytics  Tab Subtitle  left • Creating/Saving  Filters • Tracking  <daily,  weekly,  monthly   scans> • How  to  omit  older  data  using  filters   and  apply  to  campaigns • Attack  Path  viewing  (where  to  begin) • ***  Adding/changing  the  asset   schema  to  adjust  to  more  fields  to   filter  by  and/or  use  for  dynamic   targets
  • 6. Campaign  Tips • Review  of  Tagging  and  how  to  use  it  to  properly  show  on   Dashboards • Rule  of  Thumb  on  when  a  campaign  should  run  after  scan  data   updated
  • 7. Attack  Path  Review Subtitle  left • How  to  pinpoint/isolate   the   attack  paths  on  large   network  diagrams • Where  to  find  info  on  Attack   Path  campaigns  without   generating  a  report
  • 8. Fine  Tuning  Attack  Strategies Subtitle  left • Which  options  should  be  used? • How  many  should  be  created? • Most  Frequent  settings  used: • How  to  track/find  a  specific  CVE(s) • Low  Hanging  Fruit
  • 9. Live  vs  Manual  Pen  Test Subtitle  left • What  should  I  use  Live or  manual  Pentest? • Quickly  executing  a  PT   and  how • Things  to  Know
  • 10. Q   &   A