Kim will take ISIG through the collection of tools
added and configured on his penetration testing machine used throughout his book series (Holistic Info-Sec for Web Developers
). Kim will then profile a well known celebrities password, creating a short-list, then (on-line) brute force their login. Come along, it’ll be fun.