physical-security

Workshop - Tools, Password Profiling, Brute Forcing

Kim will take ISIG through the [collection of tools](https://f0.holisticinfosecforwebdevelopers.com/chap05.html#tooling-setup) added and configured on his penetration testing machine used throughout his book series ([Holistic Info-Sec for Web Developers](https://www.holisticinfosecforwebdevelopers.com)). Kim will then profile a well known celebrities password, creating a short-list, then (on-line) brute force their login. Come along, it’ll be fun.

Workshop - Holistic Info-Sec for Web Developers

Kiwicon hands-on threat modelling, attack and defence strategy training for Web Developers wishing to understand their attackers better, stay ahead of them and create cost effective defence strategies.

Talk - Password Profiling, Brute Forcing

Kim talks with his fellow Toastmasters about profiling peoples passwords and then brute forcing web applications with the shortlist of guessed passwords..

Talk - Infectious Media with Rubber Ducky

Kim talks with his fellow Toastmasters about the risks and countermeasures of luring targets to execute infectious media on their devices.

Talk - The Exploited & the Exploiters

Taking the perspective of the penetration tester hired in by the target to find the defects in their security defences before the cyber criminals do.

Talk - 0wn1ng The Web

At Functional Christchurch, due to popular demand. Taking the perspective of the penetration tester hired in by the target to find the defects in their security defences before the cyber criminals do.

Talk - 0wn1ng The Web

At Test Professionals Network Christchurch, due to popular demand. Taking the perspective of the penetration tester hired in by the target to find the defects in their security defences before the cyber criminals do.

Talk - 0wn1ng The Web

At CHCH.js Christchurch, due to popular demand. Taking the perspective of the penetration tester hired in by the target to find the defects in their security defences before the cyber criminals do.