SANS Web App Penetration Testing and Ethical Hacking Class – DAY 4
SANS Web App Penetration Testing and Ethical Hacking Class – DAY 4 DAY 4: Today was a long day… my hint for a SANS conference in Europe, is never going drinking with Terry Neal. No, seriously, save...
View ArticleSANS SEC:709 – Developing Exploits for Penetration Testers – Day 1
SANS SEC:709 – Developing Exploits for Penetration Testers – Day 1 Day 1 of the SEC:709 course is finished. Before I give some points on the course, I want to say that I’m not a coder, and to be...
View ArticleSANS SEC:709 – Developing Exploits for Penetration Testers – Day 2
SANS SEC:709 – Developing Exploits for Penetration Testers – Day 2 I didn’t get a chance to post up my thoughts on the second day of the SEC:709 class before leaving London, so here’s a quick recap of...
View ArticleNew Burp suite
The Blog over at blog.portswigger.net has been buzzing for the last month about the new version of Burp Suite. After a short time in beta testing (with users of the professional version) it’s been...
View ArticleCore Impact 8 released
We just got the news that Core Impact 8 (with XSS and Blind SQL injection) has been released by Core Technologies. You can read the full press release for the new version HERE. Main features .: XSS and...
View ArticleIn response to: Fradulent Security Experts
This post is in response to “Fradulent Security Experts” as posted on the SNOsoft Research Team Blog As a lot of other security professionals (and I use the term loosely), I subscribe to a range of...
View ArticleBuilding the ultimate pen-test reference library
I’ve been working to build up a good quality reference library of Security books for about 2 years now. Ever since I left my job as a Server Administrator to begin learning about security. Some books...
View ArticleVolatility as a penetration testing tool
What is Volatility ? Volatility is a Python based memory forensics framework designed for analyzing and extracting data from Windows XP Service Pack 2 systems. I’ve played a little with Volatility in...
View ArticleDECT Interception
dect_cli I’ve been playing about with the com-on-air and tools from dedected for a few weeks now. Results are mixed, as those who’ve sat through eth few demos I’ve run can certainly attest to. Things...
View ArticleCracking HALFLM
I was recently reading through Chris Gates post on capturing and cracking HALFLM hashes with Metasploit and thought I’d give it a quick run through. (I won’t be rehashing what Chris already covered...
View Article
More Pages to Explore .....