Quantcast
Channel: Cатсн²² (in)sесuяitу / ChrisJohnRiley » Penetration Test
Browsing all 10 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

SANS Web App Penetration Testing and Ethical Hacking Class – DAY 4

SANS Web App Penetration Testing and Ethical Hacking Class – DAY 4 DAY 4: Today was a long day… my hint for a SANS conference in Europe, is never going drinking with Terry Neal. No, seriously, save...

View Article



Image may be NSFW.
Clik here to view.

SANS SEC:709 – Developing Exploits for Penetration Testers – Day 1

SANS SEC:709 – Developing Exploits for Penetration Testers – Day 1 Day 1 of the SEC:709 course is finished. Before I give some points on the course, I want to say that I’m not a coder, and to be...

View Article

Image may be NSFW.
Clik here to view.

SANS SEC:709 – Developing Exploits for Penetration Testers – Day 2

SANS SEC:709 – Developing Exploits for Penetration Testers – Day 2 I didn’t get a chance to post up my thoughts on the second day of the SEC:709 class before leaving London, so here’s a quick recap of...

View Article

Image may be NSFW.
Clik here to view.

New Burp suite

The Blog over at blog.portswigger.net has been buzzing for the last month about the new version of Burp Suite. After a short time in beta testing (with users of the professional version) it’s been...

View Article

Image may be NSFW.
Clik here to view.

Core Impact 8 released

We just got the news that Core Impact 8 (with XSS and Blind SQL injection) has been released by Core Technologies. You can read the full press release for the new version HERE. Main features .: XSS and...

View Article


Image may be NSFW.
Clik here to view.

In response to: Fradulent Security Experts

This post is in response to “Fradulent Security Experts” as posted on the SNOsoft Research Team Blog As a lot of other security professionals (and I use the term loosely), I subscribe to a range of...

View Article

Image may be NSFW.
Clik here to view.

Building the ultimate pen-test reference library

I’ve been working to build up a good quality reference library of Security books for about 2 years now. Ever since I left my job as a Server Administrator to begin learning about security. Some books...

View Article

Image may be NSFW.
Clik here to view.

Volatility as a penetration testing tool

What is Volatility ? Volatility is a Python based memory forensics framework designed for analyzing and extracting data from Windows XP Service Pack 2 systems. I’ve played a little with Volatility in...

View Article


Image may be NSFW.
Clik here to view.

DECT Interception

dect_cli I’ve been playing about with the com-on-air and tools from dedected for a few weeks now. Results are mixed, as those who’ve sat through eth few demos I’ve run can certainly attest to. Things...

View Article


Image may be NSFW.
Clik here to view.

Cracking HALFLM

I was recently reading through Chris Gates post on capturing and cracking HALFLM hashes with Metasploit and thought I’d give it a quick run through. (I won’t be rehashing what Chris already covered...

View Article
Browsing all 10 articles
Browse latest View live




Latest Images