Feb. 24, 2023, 5:24 p.m. | R. Eric Kiser

System Weakness - Medium systemweakness.com

R. Eric Kiser

Imagine you are a penetration tester who has successfully breached a Linux web application server that hosts a procurement system. Because such systems are critical and should not experience downtime, you need to move soft but quickly. It is likely you will find several domain users, service accounts, and maybe even a domain account. You navigate to the /home folder to discover several users. This can be time-consuming and repetitive, but there is a way to automate …

account accounts application breached collecting critical cybersecurity discover domain downtime experience find folder hacking home linux penetration penetration testing procurement python python-programming quickly server service service accounts system systems testing usernames web web application

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Cyber Systems Administration

@ Peraton | Washington, DC, United States

Android Security Engineer, Public Sector

@ Google | Reston, VA, USA

Lead Electronic Security Engineer, CPP - Federal Facilities - Hybrid

@ Black & Veatch | Denver, CO, US

Profissional Sênior de Compliance & Validação em TI - Montes Claros (MG)

@ Novo Nordisk | Montes Claros, Minas Gerais, BR

Principal Engineer, Product Security Engineering

@ Google | Sunnyvale, CA, USA