{"id":285,"date":"2018-08-19T17:33:11","date_gmt":"2018-08-19T15:33:11","guid":{"rendered":"http:\/\/trustintech.eu\/?p=285"},"modified":"2018-08-19T17:33:11","modified_gmt":"2018-08-19T15:33:11","slug":"trust-in-tech-september","status":"publish","type":"post","link":"https:\/\/trustintech.eu\/index.php\/2018\/08\/19\/trust-in-tech-september\/","title":{"rendered":"Trust in Tech &#8211; September"},"content":{"rendered":"<h1><span style=\"color: #ff0000;\"><strong>Join us for our next event on 12th\u00a0<\/strong><\/span><span style=\"color: #ff0000;\"><strong>September<\/strong><\/span><\/h1>\n<p>In this Trust In Tech Meetup we will give you insights in penetration testing with Kali Linux. After a quick introduction to Kali Linux the different steps of a kill chain will be used as a guide through an attack. We will discover the different states of Reconnaissance, Weaponization, Delivery &amp; Installation, Exploitation, Command and Control and Post Exploitation.<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" class=\"size-full wp-image-291 aligncenter\" src=\"http:\/\/trustintech.eu\/wp-content\/uploads\/2018\/08\/CKC.png\" alt=\"\" width=\"506\" height=\"434\" srcset=\"https:\/\/trustintech.eu\/wp-content\/uploads\/2018\/08\/CKC.png 506w, https:\/\/trustintech.eu\/wp-content\/uploads\/2018\/08\/CKC-300x257.png 300w\" sizes=\"(max-width: 506px) 100vw, 506px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>You will be guided by our security experts hands-on.<\/p>\n<p>We will have a few prepared notebooks on stock. If you want to do it with your own machine you can either bring a Notebook with two default installed machines with Kali Linux and Windows 10<br \/>\n<a class=\"link\" title=\"https:\/\/www.kali.org\/downloads\/\" href=\"https:\/\/www.kali.org\/downloads\/\" target=\"__blank\">https:\/\/www.kali.org\/downloads\/<\/a><br \/>\nor<br \/>\nyou come a few minutes earlier and we will help you with the preparation \ud83d\ude42<\/p>\n<p>Be aware: this workshop is designed for Kali Linux Newbies.<\/p>\n<p>The meetup will take place at sepago Headquater<\/p>\n<p><a href=\"https:\/\/www.meetup.com\/de-DE\/Trust-in-Tech-Cologne\/events\/253810766\/\"><img loading=\"lazy\" class=\"alignnone size-medium wp-image-217\" src=\"http:\/\/trustintech.eu\/wp-content\/uploads\/2018\/03\/meetup_logo-300x111.png\" alt=\"\" width=\"300\" height=\"111\" srcset=\"https:\/\/trustintech.eu\/wp-content\/uploads\/2018\/03\/meetup_logo-300x111.png 300w, https:\/\/trustintech.eu\/wp-content\/uploads\/2018\/03\/meetup_logo-768x284.png 768w, https:\/\/trustintech.eu\/wp-content\/uploads\/2018\/03\/meetup_logo.png 1020w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Join us for our next event on 12th\u00a0September In this Trust In Tech Meetup we will give you insights in penetration testing with Kali Linux. After a quick introduction to Kali Linux the different steps of a kill chain will be used as a guide through an attack. We will discover the different states of&#160;[&#8230;] <\/p>\n<p><a href=\"https:\/\/trustintech.eu\/index.php\/2018\/08\/19\/trust-in-tech-september\/\" title=\"\" class=\"more-link\">Weiterlesen&#160;&#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3],"tags":[],"_links":{"self":[{"href":"https:\/\/trustintech.eu\/index.php\/wp-json\/wp\/v2\/posts\/285"}],"collection":[{"href":"https:\/\/trustintech.eu\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/trustintech.eu\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/trustintech.eu\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/trustintech.eu\/index.php\/wp-json\/wp\/v2\/comments?post=285"}],"version-history":[{"count":2,"href":"https:\/\/trustintech.eu\/index.php\/wp-json\/wp\/v2\/posts\/285\/revisions"}],"predecessor-version":[{"id":292,"href":"https:\/\/trustintech.eu\/index.php\/wp-json\/wp\/v2\/posts\/285\/revisions\/292"}],"wp:attachment":[{"href":"https:\/\/trustintech.eu\/index.php\/wp-json\/wp\/v2\/media?parent=285"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/trustintech.eu\/index.php\/wp-json\/wp\/v2\/categories?post=285"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/trustintech.eu\/index.php\/wp-json\/wp\/v2\/tags?post=285"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}