Web Application Penetration Testing for PCI

When was the last time you faced a packet trace file, and hoped to remember all the different filters used to detect anomalous network activities? Were you typing in the filters as you progress, and hoping for an alternate solution? This paper discusses some basic features in Wireshark, and the...
By Michael Hoehl
June 26, 2014

All papers are copyrighted. No re-posting of papers is permitted