Blog Posts Tagged with "Ethical Hacking"

09dae715e355968a0e90ebddf038ad56

Just One of the Reasons Why I Love Anonymous

March 28, 2012 Added by:Quintius Walker

In the world of cyber-security things transform at the speed of light. From exploits to methods, what worked yesterday is not the solution tomorrow. Ethical problem solving students should do themselves a favor and study the ways of the infamous idea known to us as Anonymous...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Don't Miss the TECHEXPO Cyber Security Hiring Event

March 13, 2012 Added by:Infosec Island Admin

Are you a Cyber Warrior and seeking a new employment opportunity? Don't miss the TECHEXPO Cyber Security hiring event March 20th. Bring resumes and interview for the many opportunities, and learn from our guest speakers William M. Jimenez, Paul de Souza, and Richard Bejtlich...

Comments  (0)

F29746c6cb299c1755e4087e6126a816

A Hacker Handbook: Who Are the Bad Guys?

January 19, 2012 Added by:Kelly Colgan

When the Internet was a baby, hackers were fairly homogeneous. Some were scamming businesses for personal gain, but most were simple graffiti artists – breaking into websites to splash some MS Paint. It was a way to rebel and earn credibility within the computer community...

Comments  (1)

4ed54e31491e9fa2405e4714670ae31f

Kolmogorov Complexity, Natural Language Programming and the Bash Shell

January 15, 2012 Added by:Kyle Young

In this post we will be treating strings as objects in a similar sense of Kolmogorov complexity. Then we will apply an alias name or function name to the object which then the alias/function name can be perceived as a natural language sentence...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Cyber India: A Country Full of Contradictions

January 05, 2012 Added by:Pierluigi Paganini

India is increasingly targeted for cyber espionage, cyber warfare, cyber terrorism, but its response to the same is not so energetic. Consider that India still has not formulated a cyber warfare policy and, as usual, the word cyber security, in the country has no meaning...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

India's ISAC to Recruit Army of White Hat Hackers

December 06, 2011 Added by:Headlines

“Less than 15 percent of Indians use the internet, but we are already No. 1 when it comes to virus infections and No. 2 in cyber crimes... As the government is trying to spread its reach through financial inclusion and e-governance projects, it's crucial that we are able to handle cyber crime..."

Comments  (0)

D8853ae281be8cfdfa18ab73608e8c3f

MSFConsole Prompt Fiddling

November 17, 2011 Added by:Rob Fuller

In my presentation at DerbyCon 2011 we talked about using SCREEN and SCRIPT to keep connections live / use them across SSH sessions, and log everything. What we didn't cover is the fact that there isn't a time stamp for those logs. Now, Metasploit has multiple ways of creating logs...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

BackTrack 5 Wireless Penetration Testing Beginner’s Guide

October 22, 2011 Added by:Dan Dieterle

This includes everything from bypassing authentication & cracking encryption, to advanced techniques like man-in-the-middle attacks and attacking WPA-Enterprise, with discussions Wireless penetration methodology, testing and reporting...

Comments  (3)

69dafe8b58066478aea48f3d0f384820

Indian Team Takes Global CyberLympics Regional Title

October 17, 2011 Added by:Headlines

“We are very honored to have this initiative supported by key players in the information security community, including IMPACT, the cybersecurity executing arm of the United Nations, and also appreciative to GITEX, one of the 3 largest ICT exhibition in the world, for being such good hosts..."

Comments  (0)

Ad5130e786d13531cc0f2cde32dacd0f

To Pen Test or Not to Pen Test, That is the Question...

October 16, 2011 Added by:Andrew Weidenhamer

A penetration assessment is simply used as a means to identify vulnerabilities and provide proof of concept on exploiting these vulnerabilities. It effectively better explains ratings associated with vulnerabilities which produces more conscious security professionals...

Comments  (6)

Ad5130e786d13531cc0f2cde32dacd0f

Changing the Landscape of Pentesting

October 11, 2011 Added by:Andrew Weidenhamer

Today’s market has become diluted with companies and individuals claiming they can perform penetration assessments - if you don’t believe me attend Defcon once. Organizations need to have a better understanding as to how these hired service providers are actually performing these assessments...

Comments  (4)

A8054e07abdfdcadb09322585cb2e085

Wow! So That Was DerbyCon...

October 03, 2011 Added by:Michael SecurityMoey

One talk that I thought was absolutely phenomenal was "Steal Everything, Kill Everyone, Cause Total Financial Ruin" with Jayson Street who walked through his antics and general mayhem. There was one major take away I got from Jayson’s talk: If your users are doing dumb stuff, it’s yours fault...

Comments  (2)

B64e021126c832bb29ec9fa988155eaf

Backtrack Metasploit Megaprimer

September 28, 2011 Added by:Dan Dieterle

The Metasploit Framework in the Backtrack series is an amazing platform for penetration and security testing. The capabilities are stunning. The problem is the learning curve is kind of steep, especially for new users. For training, look no further than the “Metasploit Megaprimer"...

Comments  (2)

7fef78c47060974e0b8392e305f0daf0

Hacker Halted: Register for Training - Get a Free iPad

September 27, 2011 Added by:Infosec Island Admin

Hacker Halted offers more than 70 speakers and a very comprehensive agenda covering major hot topics surrounding information security across four dedicated tracks. Receive a free iPad and 2 nights accommodations when you sign up for selected training or a conference pass...

Comments  (0)

D8853ae281be8cfdfa18ab73608e8c3f

Populating Your Virtual Victim Domain

September 26, 2011 Added by:Rob Fuller

Adding users to a domain for learning, training, or for testing things out on can be tedious. Most of the time I just put a few users , however that doesn't give someone in training much, i.e.: It's really easy to identify the 'interesting' users when there are only a couple to pick from...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Dutch Team European Champs for Global CyberLympics

September 21, 2011 Added by:Headlines

“CyberLympics presents a unique set of challenges that puts competing teams through a real life environment which include offensive hacking strategies but also deploying defensive capabilities to prevent being hacked. This approach makes the CyberLympics stand out..."

Comments  (0)

Page « < 1 - 2 > »