As the targets in many penetration tests and red team activities as well as being the focus of much of the active research being performed in the InfoSec arena, Windows takes center stage.However, we are not going to be talking about Windows; we are here to discuss Unix (and Unix like OSes).While these systems can and do contain some of the most critical information on many networks, we feel they do not get enough time in the spotlight.So, if you want to learn a bit more about Unix and what you can do to/with it as a pentester, then please stop by and have a listen.
Adam Compton has been a programmer, researcher, professional pentester, father, husband, and farmer.He has 2 decades of programming, network security, incident response, security assessment, and penetration testing experience. Throughout, he has worked for both federal and international government agencies as well as within the private sector.
David Boyd (@fir3d0g) is a Christian, husband, and father who also enjoys geek culture, video games, and Mountain Dew. He has over 15 years of technical experience in several environments, learning something from each one along the way.