, 9 tweets, 1 min read Read on Twitter
Next up at #NDCOslo is "making the most of security tests" by Paweł Krzywicki
White box - secure code reviews
Black box - penetration testing, look at system interfaces, use fuzzing tools etc
Red team - simulate a threat actor
Risk = severity * likelihood * detection difficulty
Red team might not start from outside - maybe a workstation is already compromised
Disassemble client executable to identify endpoints
Gradually build up knowledge of what we can do in the application based on investigation and educated guesses
Red team has to think like an attacker - don't leave a trail that could lead to the attack being discovered
Breach, but don't break
Cheap to fix issues in design and development. More expensive to carry out penetration testing and even more expensive to run red team attacks
Missing some Tweet in this thread?
You can try to force a refresh.

Like this thread? Get email updates or save it to PDF!

Subscribe to Ben Owen
Profile picture

Get real-time email alerts when new unrolls are available from this author!

This content may be removed anytime!

Twitter may remove this content at anytime, convert it as a PDF, save and print for later use!

Try unrolling a thread yourself!

how to unroll video

1) Follow Thread Reader App on Twitter so you can easily mention us!

2) Go to a Twitter thread (series of Tweets by the same owner) and mention us with a keyword "unroll" @threadreaderapp unroll

You can practice here first or read more on our help page!

Follow Us on Twitter!

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just three indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!