Calling all #pentest, #redteam, and #bugbounty professionals in #bengaluru, #india. I'll soon be #hiring an experienced technical lead for my #attacksurface operations team at @zerofox. The person selected for the role will report to me and manage the day-to-day tasking of that team. Also, this person could eventually be promoted to my #research team. Please contact me if you're interested in discussing the opportunity and you're not a recruiter.
#osint #recon #reconnaissance #securiy #infosec #golang #attacksurfacemgmt #automation #scalability #cloudinfrastructure #hiringnow #talentacquisition
#pentest #redteam #bugbounty #bengaluru #india #hiring #attacksurface #research #osint #recon #reconnaissance #securiy #infosec #golang #attacksurfacemgmt #automation #scalability #cloudinfrastructure #hiringnow #talentacquisition
Previously, users of #owasp @amass found this helpful:
1) amass intel -whois -config amass.ini -d domain.tld -o domains.txt
2) amass enum -config amass.ini -df domains.txt
3) amass db -names -df domains.txt -o hosts.txt
4) nmap -Pn -sV -A -iL hosts.txt -oN results.txt
#osint #recon #attacksurface #redteam #bugbounty #securityassessments #AttackSurfaceMapping #attacksurfacemgmt #opensource #opensourceintelligence
#owasp #osint #recon #attacksurface #redteam #bugbounty #securityassessments #AttackSurfaceMapping #attacksurfacemgmt #opensource #opensourceintelligence
How to Prevent Breaches by Protecting Your Attack Surface - Preventing breaches begins with understanding and protecting your attack surface.... http://feedproxy.google.com/~r/securityweekly/XBIC/~3/toNoCG7MuXY/ #applicationsecurity #penetrationtesting #attacksurfacemgmt #cloudsecurity #3rdpartyrisk #datasecurity #articles
#articles #datasecurity #3rdpartyrisk #cloudsecurity #attacksurfacemgmt #penetrationtesting #applicationsecurity
How Cloud Defenders Thwart Attacks Against Resilient Services - The introduction of containers and micro-service architectures have changed the w... http://feedproxy.google.com/~r/securityweekly/XBIC/~3/5xeuBcZN4ic/ #networktrafficanalysis #applicationsecurity #securityoperations #attacksurfacemgmt #containersecurity #incidentresponse #cloudsecurity #articles #blueteam #devops
#devops #blueteam #articles #cloudsecurity #incidentresponse #containersecurity #attacksurfacemgmt #securityoperations #applicationsecurity #networktrafficanalysis
How Can We Vaccinate Our Networks? - The post How Can We Vaccinate Our Networks? appeared first on Security Weekly. http://feedproxy.google.com/~r/securityweekly/XBIC/~3/EZLahC1V9Ks/ #configurationmanagement #vulnerabilitymanagement #networktrafficanalysis #threatintelligence #attacksurfacemgmt #attacksimulation #assetmanagement #cloudsecurity #remoteaccess #compliance #articles #blueteam #firewall
#firewall #blueteam #articles #compliance #remoteaccess #cloudsecurity #assetmanagement #attacksimulation #attacksurfacemgmt #threatintelligence #networktrafficanalysis #vulnerabilitymanagement #configurationmanagement
Phishing: The Gift that Keeps on Giving - The post Phishing: The Gift that Keeps on Giving appeared first on Security Weekly. http://feedproxy.google.com/~r/securityweekly/XBIC/~3/e6YaC0NXK0k/ #attacksurfacemgmt #exploitprevention #identityandaccess #securityawareness #socialengineering #attacksimulation #cloudsecurity #emailsecurity #compliance #zerotrust #articles #blueteam #privacy #osint
#osint #privacy #blueteam #articles #zerotrust #compliance #emailsecurity #cloudsecurity #attacksimulation #socialengineering #securityawareness #identityandaccess #exploitprevention #attacksurfacemgmt
Securing, Monitoring, and Remediating Immutable Infrastructure - The post Securing, Monitoring, and Remediating Immutable Infrastructure appeared first on Security W... http://feedproxy.google.com/~r/securityweekly/XBIC/~3/Y4los68jgiI/ #configurationmanagement #vulnerabilitymanagement #applicationsecurity #securityoperations #attacksurfacemgmt #containersecurity #exploitprevention #incidentresponse #assetmanagement #patchmanagement #cloudsecurity #compliance #articles
#articles #compliance #cloudsecurity #patchmanagement #assetmanagement #incidentresponse #exploitprevention #containersecurity #attacksurfacemgmt #securityoperations #applicationsecurity #vulnerabilitymanagement #configurationmanagement