Penetration Testing Mode:
(Page 3 of 639)  < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >
[HITB-Announce] REMINDER: Call for Papers for HITB GSEC 2015-05-25
Hafez Kamal (aphesz hackinthebox org)
REMINDER: The Call for Papers for the inaugural Hack In The Box GSEC
conference in Singapore is closing on the 31st of May.

Call for Papers:
Event Website:

HITB GSEC is a three-day security conference limited to 111 attendees
who v

[ more ]  [ reply ]
Breakpoint 2015 Call For Presentations 2015-05-17
cfp ruxcon org au
Breakpoint 2015 Call For Papers
Melbourne, Australia, October 22th-23th
Intercontinental Rialto

.[x]. Introduction .[x].

We are pleased to announce Call For Presentations for Breakpoint 2015.

Breakpoint showcases the work of expert security researchers from arou

[ more ]  [ reply ]
44CON London CFP Open 2015-05-13
Steve (steve 44con com)
44CON London is the UK's largest combined annual Security Conference and Training event. Taking place on the evening of the 9th and all day on the 10th and 11th of September at the ILEC Conference Centre near Earls Court, London, we will have a fully dedicated conference facility, including secure w

[ more ]  [ reply ]
Arachni Framework v1.1 & WebUI v0.5.7 have been released (Web Application Security Scanner) 2015-05-01
Tasos Laskos (tasos laskos gmail com)
Hey folks,

There's a new version of Arachni, an Open Source, modular and high-performance
Web Application Security Scanner Framework.

The highlights of this release are:

* More sensible default options.
* Approximately 7-fold performance increase (YMMV depending on webapp characteristics).
* Supp

[ more ]  [ reply ]
Ruxcon 2015 Call For Presentations 2015-04-13
cfp ruxcon org au
Ruxcon 2015 Call For Presentations
Melbourne, Australia, October 24-25
CQ Function Centre

The Ruxcon team is pleased to announce the first round of Call For Presentations for Ruxcon 2015.

This year the conference will take place over the weekend of the 24th and 25th of Oc

[ more ]  [ reply ]
Positive Hack Days V ? Call for Papers Stage 2 2015-02-25
Alexander Lashkov (ALashkov ptsecurity com)
Every night when we go to sleep we have a chance to wake up in another
universe. At any time, the expanding to infinity universe may turn back
and then rush to the start point. Or maybe finish point. Back to

The cyber universe has plunged into turmoil. Cyber criminals and special

[ more ]  [ reply ]
SpiderFoot 2.3.0 released 2015-02-12
Steve Micallef (steve binarypool com)
Hi all,

SpiderFoot 2.3.0 is now available, and includes a ton of new
functionality since 2.1.4 was last announced here. SpiderFoot is an open
source intelligence gathering / reconnaissance tool utilising over 40
data sources and methods, all driven through a snappy web UI.

Here's what's new sin

[ more ]  [ reply ]
Recon 2015 Call For Papers - June 19 - 21, 2015 - Montreal, Canada 2015-01-08
cfp2015 recon cx
+ + + +
+ + +
+ +
\ /
+ _ - _+_ - ,__

[ more ]  [ reply ]
[HITB-Announce] #HITB2015AMS Call for Papers is Open 2014-12-09
Hafez Kamal (aphesz hackinthebox org)
Happy December everyone - It's that time of the year again when we ask
you to submit your latest and greatest research papers for HITB Security
Conference in Amsterdam! Our 6th annual event in The Netherlands takes
place at the Beurs van Berlage from the 26th - 29th of May 2014.

Event Website: http

[ more ]  [ reply ]
t2â??14 Challenge to be released 2014-09-13 10:00 EEST 2014-09-07
Tomi Tuominen (tomi tuominen t2 fi)
Running assets is always difficult, however this year has been excruciating for t2 infosec. We lost one of our most prized and well placed deep cover operatives in a foreign three letter agency. Shortly after the CFP, communications stopped and we have to assume her new assignment is a permanent pla

[ more ]  [ reply ]
[Onapsis Security Advisory 2014-021] SAP HANA XS Missing encryption in form-based authentication 2014-07-29
Onapsis Research Labs (research onapsis com)
Hash: SHA1

Onapsis Security Advisory 2014-021: SAP HANA XS Missing encryption in
form-based authentication

This advisory can be downloaded in PDF format from

By downloading this advisory from the Onapsis Resource Center, you will
gain ac

[ more ]  [ reply ]
Re: failure notice 2014-07-25
Nikola Milosevic (nikola milosevic86 gmail com)
Well I believe the right answer is nothing. If you publicly disclose it,
you are risking being sued.

It is ethically to disclose it to them, as you did it. However, company is
not liable of giving you price or even do anything about the vulnerability
(I guess until it is too late). They don't even

[ more ]  [ reply ]
How to deal with the company that doesn't react on providing them information about serious security vulnerability? 2014-07-23
MichaÅ? RybiÅ?ski (fishmanos79 gmail com) (2 replies)
Hi all,

I believe this is the best place to ask such question because I would
imagine that most of people reading this list have something to do
with discovering vulnerabilities and reporting them to parties

On the beginning of the January I have discovered some security flaw
which al

[ more ]  [ reply ]
Ruxcon 2014 Final Call For Presentations 2014-07-15
cfp ruxcon org au
Ruxcon 2014 Call For Presentations
Melbourne, Australia, October 11th-12th
CQ Function Centre

The Ruxcon team is pleased to announce the Final Call For Presentations for Ruxcon 2014.

This year the conference will take place over the weekend of the 11th and 12th of October

[ more ]  [ reply ]
SmartPentester 1.0 released 2014-06-27
Smart Splat (smartpentester gmail com)
Hi All,

SmartPentester 1.0 is now available,Its an SSH based Penetration
Testing Framework for system like Kali and Backtrack
It provides a GUI for well known tools like
nmap,hping,tcpdump,volatility,hydra and etc. Consisting of modules
Penetration testing,
Malware Analysis, Forensic Analysis, Cybe

[ more ]  [ reply ]
[HITB-Announce] #HITB2014KUL round 1 CFP submission deadline in < 1 week 2014-06-24
Hafez Kamal (aphesz hackinthebox org)
The deadline to submit your papers for the the 12th and FINAL HITB
Security Conference in Malaysia is just around the corner! Paper
selection will be done in two rounds:

ROUND 1 DEADLINE: 30th June 2014
FINAL DEADLINE: 31st July 2014

HITBSecConf2014 - Malaysia takes place at Intercontinental Kuala

[ more ]  [ reply ]
Embedded Device Security Conference 2014 // CFP 2014-06-10
Michael Eddington (meddington gmail com)
EDSC is an annual security conference focusing on embedded systems,
hardware, and anything behind the silicon curtain. Embedded systems
testing is a rapidly expanding area of the security industry and
staying current is important for engineers, researchers, and testers
alike. EDSC brings the top t

[ more ]  [ reply ]
t2'14: Call for Papers 2014 (Helsinki / Finland) 2014-05-19
Tomi Tuominen (tomi tuominen t2 fi)
# t2'14 - Call For Papers (Helsinki, Finland) - October 23 - 24, 2014

Do you feel like Las Vegas is too hot, Berlin too bohème, Miami too humid, Singapore too clean and Pattaya just totally confusing ? No worries! Helsinki will be the perfect match for you â?? guaranteed low temperature, high

[ more ]  [ reply ]
Ruxcon 2014 Call For Papers 2014-05-05
cfp ruxcon org au
Ruxcon 2014 Call For Presentations
Melbourne, Australia, October 11th-12th

The Ruxcon team is pleased to announce the Call For Presentations for Ruxcon 2014.

This year the conference will take place over the weekend of the 11th and 12th
of October at the CQ Function Cent

[ more ]  [ reply ]
SpiderFoot 2.1.4 released 2014-04-28
Steve Micallef (steve binarypool com)
Hi all,

SpiderFoot 2.1.4 is now available, and will be the last enhancement
release on the 2.1 branch as I focus on 2.2. SpiderFoot is an open
source footprinting and intelligence gathering tool, written in Python
and runs on Linux, *BSD and Windows.

Since 2.1.0 was announced here in January, t

[ more ]  [ reply ]
OWASP ZAP 2.3.0 2014-04-10
psiinon (psiinon gmail com)
Hi folks,

OWASP ZAP 2.3.0 is now available :

Quick summary of the main changes:

* A ZAP 'lite' version in addition to the existing 'full' version
* View, intercept, manipulate, resend and fuzz client-side (browser) events
* Enhanced authenticat

[ more ]  [ reply ]
c0c0n 2014 | The cy0ps c0n - Call For Papers & Call For Workshops 2014-03-24
c0c0n International Information Security Conference (c0c0n is-ra org)

            ___        ___          ___   ___  __ _  _   
           / _ \      / _ \        |__ \ / _ \/_ | || | 
       ___| | | | ___| | | |_ __      ) | | | || | || |_
      / __| | | |/ __| | | | '_ \    / /| | | || |__   _|
     | (__| |_| |

[ more ]  [ reply ]
Shakacon 2014: Call for Papers - Deadline April 11th 2014-03-20
Shakacon (info shakacon org)
==<Apologies for the cross posting but hope to see everyone at the

Shakacon VI - Honolulu, Hawaii

"Sun, Surf, and C Shells"


[ more ]  [ reply ]
SAP post exploitation 2014-03-14
Brian Milliron (Brian ECRSecurity com)
Recently I ran across some vulnerable AIX SAP servers on a test and
managed to get admin access on the Web GUI. However, I know very little
about SAP and was unable to leverage SAP admin to get access to the
Oracle DB (it uses a separate credential store) or root on the OS.
Looking through all the

[ more ]  [ reply ]
IMAP STARTTLS sniff tool 2014-03-07
Bob Ezrin (bezrin gmx com)
Hi all.
We managed succesfully to sniff inside POP3S, SMTPS, IMAPS & HTTPS tunnels using:


iptables -t nat -A PREROUTING -p tcp --dport ORIGIN_PORT -j REDIRECT --to-port REDIRECT_PORT


to make man-in-the-middle.

[ more ]  [ reply ]
(Page 3 of 639)  < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >


Privacy Statement
Copyright 2010, SecurityFocus