Penetration Testing Mode:
(Page 8 of 636)  < Prev  3 4 5 6 7 8 9 10 11 12 13  Next >
Best route to penetration testing learning 2012-01-03
wlandymore (will landymore hotmail com) (1 replies)

I'm new to penetration testing and recently took the CEH. I found that it was
pretty basic but I was wondering if people had some insight as to the best
route to take if you wanted to be a penetration testing engineer....

Any courses/books that are mandatory that will help get me on my way, or
oth

[ more ]  [ reply ]
Re: Best route to penetration testing learning 2012-01-07
Archangel Amael (archangel amael gmail com)
AppSec DC 2012 CFP EXTENDED! 2012-01-06
AppSec DC (cfp appsecdc org)
All,

Many of you have written to us asking about the requirement for a
paper in our CFP hosted on EasyChair.  Due to an unforseen change in
the way EasyChair works, you are no longer able to configure a
submission to require only an abstract as we thought we had done, and
done in the past.  To be c

[ more ]  [ reply ]
Arachni v0.4 has been released (Open Source Web Application Security Scanner Framework) 2012-01-07
Tasos Laskos (tasos laskos gmail com)
Hi guys,

This is just to let you know that there's a new version of Arachni.

Arachni is a high-performance (Open Source) Web Application Security
Scanner Framework written in Ruby.

This version includes lots of goodies, including:
* A new light-weight RPC implementation (No more XMLRPC)
*

[ more ]  [ reply ]
[TOOL RELEASE] Technitium MAC Address Changer v6 (FREEWARE) 2012-01-02
Shreyas Zare (shreyas technitium com)
Hi,

Technitium MAC Address Changer allows you to change Media Access
Control (MAC) Address of your Network Interface Card (NIC)
irrespective to your NIC manufacturer or its driver. It has a very
simple user interface and provides ample information regarding each
NIC in the machine. Every NIC has a

[ more ]  [ reply ]
IPv6 spoofing 2011-12-13
Daniel García (dani madesyp com)
Hi everybody,

From iniqua are published an article of IPv6 security and risk.
This release we talk about IPv6 spoofing.

http://www.iniqua.com/2011/12/12/hacking-ipv6-iii-ipv6-spoofing-en-tunel
es-6in4/?lang=en

happy reading.

Regards!

-------------------------------------------------

[ more ]  [ reply ]
Exploitation with Armitage 2011-12-09
Infernal123 (infernal aleksic yahoo com)

http://www.youtube.com/watch?v=5CLpEcAIQa4&feature=mfu_in_order&list=UL
http://www.youtube.com/watch?v=5CLpEcAIQa4&feature=mfu_in_order&list=UL
--
View this message in context: http://old.nabble.com/Exploitation-with-Armitage-tp32938309p32938309.htm
l
Sent from the Penetration Testing mailing list

[ more ]  [ reply ]
[HITB-Announce] HITB2012AMS Call For Papers Now Open 2011-12-08
Hafez Kamal (aphesz hackinthebox org)
The Call for Papers for the third annual HITBSecConf in Europe is now
open! This year, we're moving to a new, bigger and better venue -- the
award winning Okura Hotel right in middle of Amsterdam with easy access
via public transportation. #HITB2012AMS will be a quad-track conference
featuring keyno

[ more ]  [ reply ]
Call for Papers -YSTS 6 - Security Conference, Brazil 2011-12-10
Luiz Eduardo (le ysts org)
YSTS 6th Edition
Sao Paulo, Brazil
May 7th, 2012

Call for Papers Opens: December 10th 2012
Call for Papers Close: February 26th 2012
http://www.ysts.org
@ystscon

INTRODUCTION

After 5 very successful editions we are off to the 6th edition of the
you Sh0t the Sheriff security conference and we ar

[ more ]  [ reply ]
*CLOSING IN 5 DAYS * Re: AppSec DC 2012 - Call for Trainers 2011-12-09
AppSec DC (info appsecdc org)
ALL,

Just a reminder that the call for trainers closes on December 15th.
We welcome all proposals at varying levels of technical content as
well as non web-specific training.

Submit proposals to http://training.appsecdc.org/

Regards,

The AppSec DC Program Committee

On Mon, Oct 24, 2011 at 2:27

[ more ]  [ reply ]
resources for system level security? 2011-12-05
ÃÖºÀȯ (zilly1 naver com) (1 replies)
Hi all,

I started to work of focusing on linux system level security. Mostof the servers are providing web services.

Although I have been working on application pen testing, I havelittle experience to handle with security issues of system or OSitself.

Could you recommend where I should start fo

[ more ]  [ reply ]
Re: resources for system level security? 2011-12-10
Artis Schlossberg (artis infosec lv)
auditing web/mail proxies 2011-12-05
cribbar (crib bar hotmail co uk) (3 replies)

Hey all,

Has anyone ever audited a proxy during a pen test/IT audit or as an audit on
itself? If so do you have a scope of what kind of checks you reviewed, or a
checklist? The proxy software in question is web sense which addresses both
email filtering and web filtering. Or any tools that can au

[ more ]  [ reply ]
Re: auditing web/mail proxies 2011-12-13
White Hat (whitehat237 gmail com)
Re: auditing web/mail proxies 2011-12-11
Brian Quick (brian e quick1 gmail com) (1 replies)
Re: auditing web/mail proxies 2011-12-12
A. Ramos (aramosf gmail com)
Re: auditing web/mail proxies 2011-12-06
Anders Thulin (anders thulin sentor se) (2 replies)
Re: auditing web/mail proxies 2011-12-06
Dion Stempfley (dtsonline verizon net)
Re: auditing web/mail proxies 2011-12-06
Justin Rogosky (jrogosky gmail com)
CanSecWest 2012 Mar 7-9; 2nd call for papers, closes next week, Monday. Dec 5 2011 2011-11-30
Dragos Ruiu (dr kyx net)
So after a dozen years or so organizing conferences, you
get the urge to pull levers and try experimenting with
things. So this year I sent out the CanSecWest CFP
only over Twitter, and G+ publicly. Just curious as to the
adoption and information dispersion rate, and some
estimate of the attent

[ more ]  [ reply ]
Re: career advice 2011-11-23
Enis Sahin (enis c sahin gmail com)
I don't regard writing your own scripts or tools for a pentest as
being a destructive skill but I guess it's a matter of point of view
:)

I hope I was able to get my point across about the need to create your
own thing as you know more, do more and have ideas that you have to
address yourself.

Eni

[ more ]  [ reply ]
Data in transit (with a twist)... 2011-11-23
cribbar (crib bar hotmail co uk) (2 replies)

Hey Guys,

This is not so much a pen testing question (although perhaps you pen test
physical transfers) â?? but as many of you are absolute security experts, some
I assume will be CHECK/CREST approved â?? it is a valuable resource Iâ??d like
to tap into for some general brainstorming and advice.

[ more ]  [ reply ]
Re: Data in transit (with a twist)... 2011-11-23
Bog Witch (iambogwitch gmail com)
Re: Data in transit (with a twist)... 2011-11-23
Vic Vandal (vvandal well com)
(Page 8 of 636)  < Prev  3 4 5 6 7 8 9 10 11 12 13  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus