Penetration Testing Mode:
(Page 11 of 639)  < Prev  6 7 8 9 10 11 12 13 14 15 16  Next >
Exploit Pack - New release 2012-01-18
noreply exploitpack com
Exploit Pack is a Security Tool that will assist you while you test the
security of your workstations or networks. With a friendly and easy to
use interface, it has an update manager to keep you up to date and an
IDE for develop or modify itâ??s modules. Also we provide you with
technical suppor

[ more ]  [ reply ]
Goofile 1.0 - Command line google search for files by domain 2012-01-17
tom (tom g13net com)

Goofile 1.0 has been released. This tool will perform queries against
a domain for a particular filetype. I hope this will help with


This list is sponsored by: Inf

[ more ]  [ reply ]
Best route to penetration testing learning 2012-01-03
wlandymore (will landymore hotmail com) (2 replies)

I'm new to penetration testing and recently took the CEH. I found that it was
pretty basic but I was wondering if people had some insight as to the best
route to take if you wanted to be a penetration testing engineer....

Any courses/books that are mandatory that will help get me on my way, or

[ more ]  [ reply ]
Re: Best route to penetration testing learning 2012-01-07
robertwood50 gmail com
Re: Best route to penetration testing learning 2012-01-07
Archangel Amael (archangel amael gmail com) (1 replies)
Re: Best route to penetration testing learning 2012-01-09
wlandymore (will landymore hotmail com)
AppSec DC 2012 CFP EXTENDED! 2012-01-06
AppSec DC (cfp appsecdc org)

Many of you have written to us asking about the requirement for a
paper in our CFP hosted on EasyChair.  Due to an unforseen change in
the way EasyChair works, you are no longer able to configure a
submission to require only an abstract as we thought we had done, and
done in the past.  To be c

[ more ]  [ reply ]
Arachni v0.4 has been released (Open Source Web Application Security Scanner Framework) 2012-01-07
Tasos Laskos (tasos laskos gmail com)
Hi guys,

This is just to let you know that there's a new version of Arachni.

Arachni is a high-performance (Open Source) Web Application Security
Scanner Framework written in Ruby.

This version includes lots of goodies, including:
* A new light-weight RPC implementation (No more XMLRPC)

[ more ]  [ reply ]
[TOOL RELEASE] Technitium MAC Address Changer v6 (FREEWARE) 2012-01-02
Shreyas Zare (shreyas technitium com)

Technitium MAC Address Changer allows you to change Media Access
Control (MAC) Address of your Network Interface Card (NIC)
irrespective to your NIC manufacturer or its driver. It has a very
simple user interface and provides ample information regarding each
NIC in the machine. Every NIC has a

[ more ]  [ reply ]
IPv6 spoofing 2011-12-13
Daniel García (dani madesyp com)
Hi everybody,

From iniqua are published an article of IPv6 security and risk.
This release we talk about IPv6 spoofing.

happy reading.



[ more ]  [ reply ]
Exploitation with Armitage 2011-12-09
Infernal123 (infernal aleksic yahoo com)
View this message in context:
Sent from the Penetration Testing mailing list

[ more ]  [ reply ]
[HITB-Announce] HITB2012AMS Call For Papers Now Open 2011-12-08
Hafez Kamal (aphesz hackinthebox org)
The Call for Papers for the third annual HITBSecConf in Europe is now
open! This year, we're moving to a new, bigger and better venue -- the
award winning Okura Hotel right in middle of Amsterdam with easy access
via public transportation. #HITB2012AMS will be a quad-track conference
featuring keyno

[ more ]  [ reply ]
Call for Papers -YSTS 6 - Security Conference, Brazil 2011-12-10
Luiz Eduardo (le ysts org)
YSTS 6th Edition
Sao Paulo, Brazil
May 7th, 2012

Call for Papers Opens: December 10th 2012
Call for Papers Close: February 26th 2012


After 5 very successful editions we are off to the 6th edition of the
you Sh0t the Sheriff security conference and we ar

[ more ]  [ reply ]
*CLOSING IN 5 DAYS * Re: AppSec DC 2012 - Call for Trainers 2011-12-09
AppSec DC (info appsecdc org)

Just a reminder that the call for trainers closes on December 15th.
We welcome all proposals at varying levels of technical content as
well as non web-specific training.

Submit proposals to


The AppSec DC Program Committee

On Mon, Oct 24, 2011 at 2:27

[ more ]  [ reply ]
resources for system level security? 2011-12-05
ÃÖºÀȯ (zilly1 naver com) (1 replies)
Hi all,

I started to work of focusing on linux system level security. Mostof the servers are providing web services.

Although I have been working on application pen testing, I havelittle experience to handle with security issues of system or OSitself.

Could you recommend where I should start fo

[ more ]  [ reply ]
Re: resources for system level security? 2011-12-10
Artis Schlossberg (artis infosec lv)
auditing web/mail proxies 2011-12-05
cribbar (crib bar hotmail co uk) (3 replies)

Hey all,

Has anyone ever audited a proxy during a pen test/IT audit or as an audit on
itself? If so do you have a scope of what kind of checks you reviewed, or a
checklist? The proxy software in question is web sense which addresses both
email filtering and web filtering. Or any tools that can au

[ more ]  [ reply ]
Re: auditing web/mail proxies 2011-12-13
White Hat (whitehat237 gmail com)
Re: auditing web/mail proxies 2011-12-11
Brian Quick (brian e quick1 gmail com) (1 replies)
Re: auditing web/mail proxies 2011-12-12
A. Ramos (aramosf gmail com)
Re: auditing web/mail proxies 2011-12-06
Anders Thulin (anders thulin sentor se) (2 replies)
Re: auditing web/mail proxies 2011-12-06
Dion Stempfley (dtsonline verizon net)
Re: auditing web/mail proxies 2011-12-06
Justin Rogosky (jrogosky gmail com)
CanSecWest 2012 Mar 7-9; 2nd call for papers, closes next week, Monday. Dec 5 2011 2011-11-30
Dragos Ruiu (dr kyx net)
So after a dozen years or so organizing conferences, you
get the urge to pull levers and try experimenting with
things. So this year I sent out the CanSecWest CFP
only over Twitter, and G+ publicly. Just curious as to the
adoption and information dispersion rate, and some
estimate of the attent

[ more ]  [ reply ]
(Page 11 of 639)  < Prev  6 7 8 9 10 11 12 13 14 15 16  Next >


Privacy Statement
Copyright 2010, SecurityFocus