• If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • Finally, you can manage your Google Docs, uploads, and email attachments (plus Dropbox and Slack files) in one convenient place. Claim a free account, and in less than 2 minutes, Dokkio (from the makers of PBworks) can automatically organize your content for you.


Francisco Bolaños - Ethical Hacking

Page history last edited by jstratton 9 years, 3 months ago

AASSA Educators’ Conference 2012

Francisco Bolaños

"Ethical Hacking - Applying the Open Source Security Testing Methodology Manual (OSSTMM)"




Presenter Name:  Francisco Bolaños

School/Organization:  Interamerican Academy (Guayaquil, Ecuador)

Presenter Contact Info--Email:     fbolanos@interamerican.edu.ec                                                  



Presentation Description:  This is going to be a practical workshop in which all the ethical hacking stages will be shown. The stages are:  Tracking, Exploration, Enumeration and Exploitation. The Open Source-Security Testing Methodology Manual OSSTMM will be applied in order to document and log everything in a professional way. This methodology will allow the IT department to monitor and organize all traffic and security issues that take place in the network in the selected device.


Date: Friday, March 16, 2012


Materials and resources: 

Comments (0)

You don't have permission to comment on this page.