Vertiv Group Corporation
–
Westerville, OH
... and proof of concept code to document findings Perform System Breakdown of the project/product before testing, identify ... corruption exploits, rootkits, protocol poisoning, browser-based attacks, DNS poisoning, MetaSploit, nmap, Nessus, etc. ... - Jun 12