Blog Posts Tagged with "Ethical Hacking"
March 28, 2012 Added by:Quintius Walker
In the world of cyber-security things transform at the speed of light. From exploits to methods, what worked yesterday is not the solution tomorrow. Ethical problem solving students should do themselves a favor and study the ways of the infamous idea known to us as Anonymous...
March 13, 2012 Added by:Infosec Island Admin
Are you a Cyber Warrior and seeking a new employment opportunity? Don't miss the TECHEXPO Cyber Security hiring event March 20th. Bring resumes and interview for the many opportunities, and learn from our guest speakers William M. Jimenez, Paul de Souza, and Richard Bejtlich...
January 19, 2012 Added by:Kelly Colgan
When the Internet was a baby, hackers were fairly homogeneous. Some were scamming businesses for personal gain, but most were simple graffiti artists – breaking into websites to splash some MS Paint. It was a way to rebel and earn credibility within the computer community...
January 15, 2012 Added by:Kyle Young
In this post we will be treating strings as objects in a similar sense of Kolmogorov complexity. Then we will apply an alias name or function name to the object which then the alias/function name can be perceived as a natural language sentence...
January 05, 2012 Added by:Pierluigi Paganini
India is increasingly targeted for cyber espionage, cyber warfare, cyber terrorism, but its response to the same is not so energetic. Consider that India still has not formulated a cyber warfare policy and, as usual, the word cyber security, in the country has no meaning...
December 06, 2011 Added by:Headlines
“Less than 15 percent of Indians use the internet, but we are already No. 1 when it comes to virus infections and No. 2 in cyber crimes... As the government is trying to spread its reach through financial inclusion and e-governance projects, it's crucial that we are able to handle cyber crime..."
November 17, 2011 Added by:Rob Fuller
In my presentation at DerbyCon 2011 we talked about using SCREEN and SCRIPT to keep connections live / use them across SSH sessions, and log everything. What we didn't cover is the fact that there isn't a time stamp for those logs. Now, Metasploit has multiple ways of creating logs...
October 22, 2011 Added by:Dan Dieterle
This includes everything from bypassing authentication & cracking encryption, to advanced techniques like man-in-the-middle attacks and attacking WPA-Enterprise, with discussions Wireless penetration methodology, testing and reporting...
October 17, 2011 Added by:Headlines
“We are very honored to have this initiative supported by key players in the information security community, including IMPACT, the cybersecurity executing arm of the United Nations, and also appreciative to GITEX, one of the 3 largest ICT exhibition in the world, for being such good hosts..."
October 16, 2011 Added by:Andrew Weidenhamer
A penetration assessment is simply used as a means to identify vulnerabilities and provide proof of concept on exploiting these vulnerabilities. It effectively better explains ratings associated with vulnerabilities which produces more conscious security professionals...
October 11, 2011 Added by:Andrew Weidenhamer
Today’s market has become diluted with companies and individuals claiming they can perform penetration assessments - if you don’t believe me attend Defcon once. Organizations need to have a better understanding as to how these hired service providers are actually performing these assessments...
October 03, 2011 Added by:Michael SecurityMoey
One talk that I thought was absolutely phenomenal was "Steal Everything, Kill Everyone, Cause Total Financial Ruin" with Jayson Street who walked through his antics and general mayhem. There was one major take away I got from Jayson’s talk: If your users are doing dumb stuff, it’s yours fault...
September 28, 2011 Added by:Dan Dieterle
The Metasploit Framework in the Backtrack series is an amazing platform for penetration and security testing. The capabilities are stunning. The problem is the learning curve is kind of steep, especially for new users. For training, look no further than the “Metasploit Megaprimer"...
September 27, 2011 Added by:Infosec Island Admin
Hacker Halted offers more than 70 speakers and a very comprehensive agenda covering major hot topics surrounding information security across four dedicated tracks. Receive a free iPad and 2 nights accommodations when you sign up for selected training or a conference pass...
September 26, 2011 Added by:Rob Fuller
Adding users to a domain for learning, training, or for testing things out on can be tedious. Most of the time I just put a few users , however that doesn't give someone in training much, i.e.: It's really easy to identify the 'interesting' users when there are only a couple to pick from...
September 21, 2011 Added by:Headlines
“CyberLympics presents a unique set of challenges that puts competing teams through a real life environment which include offensive hacking strategies but also deploying defensive capabilities to prevent being hacked. This approach makes the CyberLympics stand out..."
OSI Model’s Relevance to Web App Security... Ankila Bhardwaj on 03-26-2015
Observations From Advisen Cyber Risk Confere... Harjinder singh on 03-26-2015
Who Validates Alerts Validated by Your Alert... Harjinder singh on 03-26-2015