Welcome to The Professional Security Testers Warehouse for the CEH V7 GPEN CPTS CREST GCIH GREM OPST
Search
Nickname Password Security Code Security Code Type Security Code  
Become a Cyber Warrior get the CEH V8 now
FITSI the certification program for the federal workforce

We recommend:

Cyber Defense Magazine  Your Premier Source for IT Security Information

Video Library

Skimming for ID theft
5 / 2
Views: 230
Comments: 16
11-01-2008 05:18

Latest version of ATM skimmer hidden behind a speaker looking device
5 / 3
Views: 246
Comments: 11
11-01-2008 05:11

ATM Scam, do check your ATM machine before using it
5 / 2
Views: 226
Comments: 12
11-01-2008 04:59

Survey

Whic of the following certifications would you like to get?

GPEN
GCIH
CEH
CREST
GREM
GSEC
CISSP
Security+
Other (please leave a comment)



Results
Polls

Votes: 470
Comments: 0

Who's Online

There are currently, 351 guest(s) and 24 member(s) that are online.

You are Anonymous user. You can register for free by clicking here
The CCCure Family of Portals is strictly supported by our Sponsors below and Donations.

Acunetix Web Vulnerability Scanner
The BEST Web Vulnerability Scanner
Click HERE for more information

Best security training in the world -- Forging IT security Experts
SecureNinja Dojo
SecureNinja Classes

FITSP the Federal Government Certification

CLICK HERE
to get more details

Clement, Nathalie, and Alain the Portals administrators wishes you a warm welcome.


Calendar of Upcoming Classes and Events


CompTIA Security+ CBT Tutorial @ only $47.77 a month
Posted by cdupuis on Tuesday, 04 March 2014 @ 07:48:56 CET (259 reads)
Topic Security+

Anonymous writes "

Security+ Tutorial cover CompTIA CBK objectives

Good day to all,

CCCure has just launched a new computer based tutorial for Security+,  we have an introductory special for thanksgiving at only $47.77 per month.  This is a limited introductory offer and then it will be sold at the regular price of $67.77 a month.

You can subscribe at:   http://cccure.me/index.php


This CBT is NOT for people who are ONLY interested in passing the exam without gaining true knowledge. 

This CBT is an holistic coverage of 100% of all of the Security+ 301 objectives from CompTIA.  It will give you a very strong foundation on which you can build and advance further into your career.   We do not believe in producing people with only letters after their name, we believe in producing security professionals who can Talk The Talk and Walk The Walk.

This is the exact same content that you would get if you attend one of my 5 days bootcamp.  The difference is you do it on your own time and you get email support from your instructor Clement Dupuis as you make it through your learning package. 

The portal we use to deliver the content has downloads, forums, videos, tips and tricks, and a whole lot more. 

Our forums discusses in detail the new performance based questions and what you can expect on the exam.  There will be no surprise when you get to the real exam.  We will walk you through those scenarios step by step.   We will make sure you have the knowledge and skills to decipher those scenario based questions and pass the exam while ensuring you become a knowledgeable and contributing member of any team.

This package has proven itself over the past year with a documented passing rate above 96% in the dozens of classes where it was used.   It has been used by hundreds of students who have passed their exam on the first try.   This is field tested and our students always had raving reviews about it's content.

You can subscribe at:   http://cccure.me/index.php

If you have any questions please send an email to: clement dot dupuis at cccure dot com

Best regards

Clement

"

(Read More... | Score: 0)


Acunetix Online Vulnerability Scanner
Posted by cdupuis on Wednesday, 26 February 2014 @ 11:09:53 CET (729 reads)
Topic Acunetix

Acunetix Online Vulnerability Scanner

The need to secure your website and perimeter servers is evident - each year thousands of hacks take place that wreak havoc to businesses. Yet not all businesses can afford to operate the required scanning tools to check that your systems are secure. Acunetix Online Vulnerability Scanner acts as a virtual security officer for your company, scanning your websites, including integrated web applications, web servers and any additional perimeter servers for vulnerabilities. And allowing you to fix them before hackers exploit the weak points in your IT infrastructure!

Leverages Acunetix leading web application scanner

Building on Acunetix’ advanced web scanning technology, Acunetix OVS scans your website for vulnerabilities - without requiring to you to license, install and operate Acunetix Web Vulnerability scanner. Acunetix OVS will deep scan your website - with its legendary crawling capability - including full HTML 5 support, and its unmatched SQL injection and Cross Site Scripting finding capabilities.

Unlike other online security scanners, Acunetix is able to find a much greater number of vulnerabilities because its intelligent analysis engine - it can even detect DOM Cross-Site Scripting and Blind SQL Injection vulnerabilities. And with a minimum of false positives. Remember that in the world of web scanning its not the number of different vulnerabilities that it can find, its the depth with which it can check for vulnerabilities. Each scanner can find one or more SQL injection vulnerabilities, but few can find ALMOST ALL. Few scanners are able to find all pages and analyze all content, leaving large parts of your website unchecked. Acunetix will crawl the largest number of pages and analyze all content.

Utilizes OpenVAS for cutting edge network security scanning

And Acunetix OVS does not stop at web vulnerabilities. Recognizing the need to scan at network level and wanting to offer best of breed technology only, Acunetix has partnered with OpenVAS - the leading network security scanner. OpenVAS has been in development for more then 10 years and is backed by renowned security developers Greenbone. OpenVAS draws on a vulnerability database of thousands of network level vulnerabilities. Importantly, OpenVAS vulnerability databases are always up to date, boasting an average response rate of less than 24 hours for updating and deploying vulnerability signatures to scanners.

Start your scan today

Getting Acunetix on your side is easy - sign up minutes, install the site verification code and your scan will commence. Scanning can take several hours, depending on the amount of pages and the complexity of the content. After completion scan reports are emailed to you - and Acunetix Security Consultants are on standby to explain the results and help you action remediation. Sign up here

 

Complete Vulnerability Management in one Holistic Dashboard Online Vulnerability Scanner - All Scans
Dashboard (Click to Enlarge) All Scans (Click to Enlarge)

(Read More... | Score: 0)


C++ for Hackers tutorial -- Totally FREE from the folks at Hack In Sight
Posted by cdupuis on Tuesday, 29 October 2013 @ 09:54:24 CET (325 reads)
Topic

NOTE FROM CLEMENT:  See below a nice C++ Tutorial from the folks at Hack In Sight.

Hi Clement,

I hope you are doing well.

Yesterday I released the 2nd Hack Insight issue available for free. The main title is: 'C++ For Hakers' and it's a base for our next tutorial which will be called "Hacking with C++".

I would like to share it with you and invite your to further share it with your community.

C++ for Hackers

 

Short description:
--
C++ For Hackers
Full publication available for FREE!

This tutorial is designed for everyone: Even if you've never programmed before or if you have extensive experience programming in other languages and want to expand into C++! It is for everyone who wants the feeling of accomplishment from a working program.

You can download it here: www.professionalsecuritytesters.org/Documents/Hack_In_Sight/Tutorials/Cplusplustutorial.pdf
If this tutorial was helpful for you don't hesitate to share it in your social media and among your friends.

You can visit us at:  http://www.hackinsight.org/  for a lot more and also to look at our magazine as well.

Enjoy the hacking!
Hack Insight Team

(Read More... | Score: 0)


Recording Available: Retina Network Security Scanner Unlimited
Posted by cdupuis on Tuesday, 29 October 2013 @ 09:22:05 CET (943 reads)
Topic Web Applications Security

i Clement,

Thank you for registering for the recent BeyondTrust Webinar, "Showcasing Retina Network Security Scanner Unlimited" featuring our CTO, Marc Maiffret. 

If you were unable to attend or are interested in viewing the webinar again, you can find the link to the recording here: 
http://vimeo.com/77629524

Retina Network Security Scanner Unlimited is the fastest, most mature vulnerability assessment solution on the market, and is now available for only $1,200 per year. Features available in Retina Network Security Scanner Unlimited include:

  • Unlimited IP scanning
  • Web, database & virtual application scanning
  • PCI DSS scanning and reporting
  • SCADA scanning
  • Regulatory reporting
  • Scheduled scans
  • Web-based tech support
To learn more about Retina Network Security Scanner Unlimited, click here! 
- The BeyondTrust Team 

BeyondTrust
550 West C Street, Suite 1650
San Diego, CA 92101


If you were unable to attend or are interested in viewing the webinar again, you can find the link to the recording here: 
http://vimeo.com/77629524

Retina Network Security Scanner Unlimited is the fastest, most mature vulnerability assessment solution on the market, and is now available for only $1,200 per year. Features available in Retina Network Security Scanner Unlimited include:

  • Unlimited IP scanning
  • Web, database & virtual application scanning
  • PCI DSS scanning and reporting
  • SCADA scanning
  • Regulatory reporting
  • Scheduled scans
  • Web-based tech support
To learn more about Retina Network Security Scanner Unlimited, click here! 

 

- The BeyondTrust Team 

BeyondTrust
550 West C Street, Suite 1650
San Diego, CA 92101


(Read More... | Score: 0)


Vivek at SecurityTube has a new SQL Injection CTF
Posted by cdupuis on Tuesday, 22 October 2013 @ 17:53:09 CEST (723 reads)
Topic Web Applications Security

NOTE FROM CLEMENT:

This lab was deveopled by Sid who is a master of SQL Injection extraordinaire.   You can attend his full two days class in Washington, DC on December 16th and 17th.   This is a great opportunity to learn from the best of the best and you will learn where automated tools are stopping and how a good brain can go a lot further with proper skills.  A class not to miss for sure.   Click HERE for details.  Clement

Hello All,
 
To celebrate the launch of SQLi labs we will be hosting a public CTF from October 25th-27th. The CTF is FREE to participate, but please register for it using the link below:
 
Registration Link:  http://ctf.notsosecure.com/
 
1. When does the CTF start?

16:00 BST on Friday 25th October
 
2. When does CTF end?

21:00 BST on Sunday 27th October
 
3. How many challenges and what are the objectives?

There will be 2 challenges and you will have to obtain 2 flags. Everyone who gets both Flags will find a mention on our leader-board page.
 
About SQLi Labs:
 
SQL Injection Labs provides an on-line platform to master The Art of Exploiting SQL Injection. From SQLi 101 to mind bending 2nd order injection, file read/write access, remote code execution; we have got it all covered. Whether you are a student who is just starting a career in field of IT security or a professional who wants to become a Ninja, we have something for everyone!

http://securitytube-training.com/virtual-labs/sql-injection-labs/index.html

Regards,

Vivek Ramachandran
Founder, SecurityTube.net


(Read More... | Score: 0)


OWASP Xenotix XSS Exploit Framework V4.5 is Released
Posted by cdupuis on Wednesday, 16 October 2013 @ 22:36:21 CEST (1081 reads)
Topic Web Applications Security

Hello,

Xenotix XSS Exploit Framework is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework. It provides Zero False Positive scan results with its unique Triple Browser Engine (Trident, WebKit, and Gecko) embedded scanner. It is claimed to have the world’s 2nd largest XSS Payloads of about 1500+ distinctive XSS Payloads for effective XSS vulnerability detection and WAF Bypass. It is incorporated with a feature rich Information
Gathering module for target Reconnaissance. The Exploit Framework includes highly offensive XSS exploitation modules for Penetration Testing and Proof of Concept creation.

V4.5 Additions
==========
JavaScript Beautifier
Pause and Resume support for Scan
Jump to Payload
Cookie Support for POST Request
Cookie Support and Custom Headers for Header Scanner
Added TRACE method Support
Improved Interface
Better Proxy Support
WAF Fingerprinting
Load Files
Hash Calculator
Hash Detector

Download: https://www.owasp.org/index.php/OWASP_Xenotix_XSS_Exploit_Framework#tab=Downloads

Regards,
Ajin Abraham

Information Security Enthusiast.
www.ajinabraham.com | www.defconkerala.org
www.opensecurity.in | +91-9633325997


(Read More... | Score: 0)


Unlimited Retina vulnerability scanner for only $1,200
Posted by cdupuis on Wednesday, 09 October 2013 @ 16:02:58 CEST (1730 reads)
Topic Web Applications Security

Anonymous writes "

NOTE FROM CLEMENT:

Retina has been used by Govenment Departments as well as commercial companies throughout the world for years. It is well known for its accuracy and low amount of false positive. You now have a unique chance to acquire your own copy at an amazing price. This is a no brainer, you will get your full return on investment at first usage.

Enjoy!

Clement.

 
Retina Unlimited IPs for only $1200
                 
 
Unlimited Retina network and web vulnerability scanning – only $1,200
     
                 
     
It’s been 15 years since Retina Network Security Scanner first revolutionized vulnerability management with real-time security auditing and testing. To celebrate this milestone, we’re now offering the full-featured, unlimited-IP version for only $1,200 per year.

> Learn more and buy online now

Retina Network Security Scanner is the fastest, most mature vulnerability assessment solution available.
   
     
  • Discover all network (local & remote), web, database and virtual assets in your environment
  • Identify system, application, database, OS and web application vulnerabilities
  • Reveal at-risk personally identifiable information and other sensitive data
  • Prioritize remediation based on exploitability, BeyondTrust research, CVSS and other factors
  • Confirm exploitability with one click to the Metasploit Framework
  • Report progress and results to management, compliance and other roles
  • Share data with SIEM and GRC solutions
         
       
 
               
   
At only $1,200, Retina Network Security Scanner delivers immediate ROI from increased team efficiency and quantifiable risk reduction. Download Retina Scanner today, and join the 10,000+ organizations already finding and fixing vulnerabilities the BeyondTrust way.

Learn more and buy

- The BeyondTrust Team
     
                 
 

BeyondTrust
| 550 West C Street, Suite 1650 San Diego, CA 92101
www.beyondtrust.com
| 1.866.339.3732 | Privacy Policy

"

(Read More... | Score: 0)


Kali Linux Special Edition of Hakin9
Posted by cdupuis on Sunday, 22 September 2013 @ 15:26:25 CEST (912 reads)
Topic Hakin9

Take a Look at Hakin9's 'Guide to Kali Linux' - Articles Written by Professionals - and Gain Expert Skills in Kali Linux!

You received this newsletter because you subscribed to autoresponder address list of Hakin9 magazine.
If you want to unsubscribe please click the link.

Dear Readers,

Along with the Autumn here it comes the comprehensive 'Guide to Kali Linux'. In the following issue we will focus on this popular, yet still-much-to-discover pentesting tool.

Many our Followers were patiently waiting for this great issue and here it is! Just take a look at the content:


BASICS:

Kali Linux - What's new?
By Steven McLaughlin, Security Researcher
Kali Linux released earlier in the year is dubbed the most advanced penetration testing distribution, ever. How does it compare to BackTrack?, and: What's the difference?

Kali Linux for Enterprises
By Navneet Sharma, Information Security Analyst
Whenever we think of Penetration Testing (PT) the first name that comes to our mind is "Backtrack (BT)", which we have been using for the last few years. Backtrack, funded by offensive Security (www.offensive-Security.com), is also one of the most popular UBUNTU Linux based platform, with collection of organized security testing tools such as Open-VAS, maltigo, Metasploit Framework (MSF), etc. Last release to Backtrack series was Backtrack 5 R2 with codename Revolution.
Kali Linux is the latest linux distribution made for penetration testing by and used by security assessors and hackers. Kali Linux is also considered as a successor to Backtrack.

ATTACK:

Weaponization of Android Platform using Kali Linux
By Daniel Singh, Independent Consultant in network and systems security
Kali Linux has become the most popular tool for professional penetration testing and security auditing. In this article, we will review how to couple the functionality of Kali Linux with Android platform over HTC One X smartphone to create an invincible penetration-testing weapon.

Kali Linux, Attacking Servers
By Ismael Gonzalez D., Security Researcher, CEH, MCP, MCDTS, MCSA, LPIC-1
This article will show you how to perform attacks on web servers, getting full access to the system and database. Just by using some of the 'Top Ten' tools of Kali Linux.

Hands On: How to Create "Backdoor" to Remote Access with Kali Linux, DNS Spoofing Attack with Ettercap and Cloning Sites with Kali Linux
By Rafael Fontes Souza, Co-Founder at Grey Hats, member of the "French Backtrack Team"
The three articles describe very useful tools in Kali and cover the ideas of creating backdoor, how to perform the spoof attack and how to clone websites with SET Attack Method.

DEFENSE:

Kali Scanning for HIPPA - A Proof of Concept: using Kali Linux to deploy distributed network vulnerability scanners for medical clients
By Charlie Waters, Security Officer and Senior Consultant for Infinity Network Solutions
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) requires organizations who handle electronic Protected Health Information (e-PHI) to take action and reduce risk relative to potential security breaches of digital communication and storage of patient information. Open Source solutions can be leveraged as a low-cost and effective strategy to minimize risk when used as component of a larger information security program. With a long “track” record of community support, Kali is an open source Linux distribution containing many security tools to meet the needs of HIPAA network vulnerability scans.

KALI LINUX - A Solution to HACKING/SECURITY
By Deepanshu Khanna, Linux Security Researcher
Today is the world of technology and everyone somehow is attached to it. Some are using the technology for the good purpose and some are using it for bad purposes and Internet is one of those technologies which define both my statements. Internet is being used both by the good (the White Hats) and the bad (the Black Hats). So, my paper is totally based on the above line that the OS (Operating System) KALI LINUX (which is an extension to Backtrack) can be used in both the ways either for good or bad.

Take a Closer Look at Hakin9's Tutorials Written by Professionals and Gain Expert Skills in Kali Linux!


Did you know that?

When you purchase your individual subscription for 221,40 USD you not only receive all the issues published within a year from the date of the purchase but you also get the access to our archive that dates back to 2005. Therefore, You pay less than 1$ for an individual issue of our magazine! We recommend getting our subscription!

Become a versatile IT Security Expert with Hakin9's IT SEC MASTER PACK

Purchase IT SEC MASTER PACK and get more than just one subscription to the magazines published by Hakin9 Media. All this with a great discount!

Choose from Hakin9, PenTest, eForensics, SDJ

1 subscription - 221,40 USD
2 magazines - 300 USD
3 magazines - 350 USD
4 magazines - 400 USD

BUY IT PACK

To take advantage of the offer, please send your messages to en@hakin9.org with IT MASTER in the theme.

Become a MASTER!

 

PTK Forensics as a reward!

Dear eForensics Readers!

DFLabs offers 5 licenses of PTK Forensics for eForensics readers. 3 licenses are available for the winners of the contest and 2 for new subscribers only.

More information here: http://eforensicsmag.com/ptk-forensics-as-a-reward

Please spread the word about Hakin9.
Hakin9 team wish you good reading!
Product Manager: krzysztof.samborski@hakin9.org
www.hakin9.org/en

New profiles on:


(Read More... | Score: 0)


A new version of Arachni (web app scanner) has been released
Posted by cdupuis on Saturday, 14 September 2013 @ 21:46:03 CEST (842 reads)
Topic Web Applications Security

Hey folks,

There's a new version of Arachni, an Open Source, modular and
high-performance Web Application Security Scanner Framework written in Ruby.

Brief list of changes:

* Optimized pattern matching to use less resources by grouping patterns to only
    be matched against the per-platform payloads. Bottom line, pattern matching
    operations have been greatly reduced overall and vulnerabilities can be used
    to fingerprint the remote platform.
* Modules
    * Path traversal (path_traversal)
        * Updated to use more generic signatures.
        * Added dot-truncation for MS Windows payloads.
        * Moved non-traversal payloads to the file_inclusion module.
    * File inclusion (file_inclusion) — Extracted from path_traversal.
        * Uses common server-side files and errors to identify issues.
    * SQL Injection (sqli) — Added support for the following databases:
        * Firebird
        * SAP Max DB
        * Sybase
        * Frontbase
        * IngresDB
        * HSQLDB
        * MS Access
    * localstart_asp — Checks if localstart.asp is accessible.
* Plugins — Added:
        * Uncommon headers (uncommon_headers) — Logs uncommon headers.

For more details about the new release please visit:
     http://www.arachni-scanner.com/blog/arachni-0-4-5-1-0-4-2-release/

Download page: http://www.arachni-scanner.com/download/

Homepage           - http://www.arachni-scanner.com
Blog               - http://www.arachni-scanner.com/blog
Documentation      - https://github.com/Arachni/arachni/wiki
Support            - http://support.arachni-scanner.com
GitHub page        - http://github.com/Arachni/arachni
Code Documentation - http://rubydoc.info/github/Arachni/arachni
Author             - Tasos "Zapotek" Laskos (http://twitter.com/Zap0tek)
Twitter            - http://twitter.com/ArachniScanner
Copyright          - 2010-2013 Tasos Laskos
License            - Apache License v2

Cheers,
Tasos Laskos


(Read More... | Score: 0)


SK Magazine Issue 11 -- Call for Articles
Posted by cdupuis on Monday, 02 September 2013 @ 16:25:52 CEST (1152 reads)
Topic Web Applications Security

SK Magazine 11th issue
Call For Articles 
Dear Reader,

Oct/Dec. Issue is in the preparation phase.This issue's theme is Hardware Security.If you are specialised in that part of security, please share your experience with us.other topics are also open , for example the user to user section, book reviews section, ..etc
 
Sincerely,
Bluekaizen
Deadline to submit articles
 15th of September 2013

Submit articles : 
info (at) bluekaizen (dot) org

Like us on FacebookFollow us on Twitter

 


(Read More... | Score: 0)


SpiderFoot 2.0.4 released
Posted by cdupuis on Monday, 02 September 2013 @ 15:53:32 CEST (763 reads)
Topic Web Applications Security

Hi everyone,

I'm pleased to announce the release of SpiderFoot 2.0.4. SpiderFoot is a free, multi-platform open-source footprinting and intelligence gathering tool.

Since 2.0.0 was released in May, there have been a number of subsequent releases not announced to these lists, so if you are upgrading from 2.0.0 to 2.0.4, you'll get the following improvements:

    - Collects SSL certificate information and performs a number of checks.
    - Identifies social media presence on LinkedIn, Twitter, Facebook, etc.
    - Identifies the use of Javascript frameworks like jQuery, etc.
    - Identifies the use of externally hosted Javascript.
    - Looks across all Internet TLDs for presence of the target.
    - Performs faster port scanning, with the addition of banner grabbing.
    - Performs more thorough DNS analysis of the target.
    - Includes many bug fixes and internal improvements.

Grab it from: http://www.spiderfoot.net/

If you'd like to keep up-to-date on SpiderFoot news and releases, please follow me on twitter at @binarypool or on github at https://github.com/smicallef/spiderfoot, as I will only be posting here on an ad-hoc basis and not for all releases.

Thanks,

Steve


(Read More... | Score: 0)


Wounded Warrior Cyber Combat Academy Upcoming Seminar
Posted by cdupuis on Wednesday, 31 July 2013 @ 23:12:41 CEST (590 reads)
Topic In the News

NOTE FROM CLEMENT:  

The Wounded Warrior Cyber Combat Academy (W2CAA) is a project that is very dear to me as a veteran and one that I strongly support in any way that I can.  I invite you to read an important update below about this exciting project and also would like to seek your help in spreading the word about this amazing initiative and please do get involved as well.  It is a very noble cause.

See the latest update about the project below:

Dear W2CCA Supporter,

Things are going well with our program.  Here's a couple of updates:

1.  Upcoming Seminar at Walter Reed

NSA Bethesda Fleet & Family Support Center is helping put on a 2 hour seminar entitled "Cyber Security in the 21st Century." 

We have a number of high profile speakers that are going to be talking to the Wounded Warrior population about how the new battlefront is cyber and this represents a great career opportunity to transitioning service members. 

SEMINAR DATE:    Aug 15, 2013   
TIME:                    10:30am -  12:30pm
LOCATION:            NICoE Bldg. NSA Bethesda
                              Building 51, First Floor Main Auditorium

TARGET AUDIENCE:
- Transitioning Service Members
- Wounded Warriors and their family members
- Installation CIV/CTR’s welcome

SPEAKER LINEUP:
Colonel Michelle Fraley   -  Commanding Officer WTB
Mr. William Lay             -  Department of State
Dr. Ron Ross                -  NIST
Anne Bloesl                  -  FFSC

If you know any Wounded Warriors would you please forward the attached flyer to them or send them the link immediately.   The 2 hour seminar is free of charge.

See details at the URL below:

https://www.cccure.org/Documents/w2cca/Cyber_Security_in_the_21st_Century.pdf

 

2.  Fundraising

We have 30+ candidates on the waitlist for Cyber Team 2 (The second group that will be trained under this project). 

We are in the process of soliciting donations to help finance the next Cyber Team. 

If you know of anyone that wants to donate to this worthwhile cause please point them to the following site:  http://www.w2cca.org

There is a donate option on the menu on the left and all donations are tax deductible…

 

3.  Media Attention 

A number of our volunteers are working a trying to get some media exposure for our program.  More to come on this!

Thanks,

Jim Wiggins
Executive Director
FITSI - Federal IT Security Institute3213 Duke St #190
Alexandria, VA  22314
Phone:  703-828-1196  x701
Cell:  571-277-4661
http://www.fitsi.org


(Read More... | Score: 0)


New resources from ISECOM -- Very interesting projects
Posted by cdupuis on Tuesday, 30 July 2013 @ 10:27:07 CEST (637 reads)
Topic ISECOM

Anonymous writes "

Hi,

Well, the summer is hot but at ISECOM we've been on fire! We have finished 2 new documents:

** Secure Programming Guidelines **

A concise and language-agnostic methodology to guide programmers towards writing secure code. The hardest part was to make it short and concise and not overly technical so it's readable, part of our new strategy across all of our releases.


** Vendor Security Checklist **

A means to measure risk/trust as well as the attack surface of any 3rd party vendor including Cloud vendors!  Again, we kept it short and to the point with just 25 questions which get to the heart of operations and tell you what you need to know about how secure the vendor is with your stuff and if you can trust them. Soon to be an app you can take with you and get the calculations and answers you need automatically!

The documents will currently only be released to team members and partners but as soon as they pass peer review, they'll be freely available!

We are still looking for help on the SPG, specifically those with secure coding experience who will help us with more examples and other specifics. Let me know if you are interested in helping.

Sincerely,

-pete.
<pete@isecom.org>

"

(Read More... | Score: 0)


BackTrack - Testing Wireless Network Security
Posted by cdupuis on Sunday, 14 July 2013 @ 12:50:53 CEST (685 reads)
Topic WarDriving

Good day to all,

My good friend Kevin Cardwell has just published a new book about Wireless Security Testing.

It is a nice book that will teach your how to use BackTrack (can be very easily adapted to Kali as well).

See the details of the book at the link below:

http://link.packtpub.com/ef7rUq

 

BackTrack - Testing Wireless Network Security

The book is published throug PACKT which means you don't need a loan or mortgage to buy it.  They are selling books with great content at fair price.

Enjoy!

Clement

 

 

 


(Read More... | Score: 0)


Part 2 of the CCCure CISSP Scenario Based Questions is completed
Posted by cdupuis on Tuesday, 25 June 2013 @ 14:47:08 CEST (749 reads)
Topic In the News

Good day to all,

Today I have released part 2 of 2 of the CCCure CISSP Scenario Based Questions.  This second set covers five domains of the CBK.

Visit the links below to get all of the details and get your own copy.

You can get a copy of Part 2 of 2 covering domains 6 to 10 for only $29.99 at:
https://www.cccure.com/cart/products/CISSP-Scenario-Based-Questions-Part-2-of-2-%28Domains-6-to-10%29.html

You can get a copy of Part 1 of 2 covering domains  1 to 5 for only $29.99 at:
https://www.cccure.com/cart/products/CISSP-Scenario-Based-Questions-Part-1-of-2-%28Domains-1-to-5%29.html


COMBO PACK

You can buy Part 1 and Part 2 as a combo package covering all 10 domains for only $49.99 at:
https://www.cccure.com/cart/products/CISSP-Scenario-Based-Questions-Combo-Part-1-and-Part-2-%28All-10-domains%29.html

Enjoy

Clement

(Read More... | Score: 0)


Our Sponsors

The best vulnerability scanner in the world

Login

Nickname

Password

Security Code:
Security Code
Type Security Code

Don't have an account yet? You can create one. As a registered user you have some advantages like theme manager, comments configuration and post comments with your name.

Reverse Engineering

Big Story of Today

There isn't a Biggest Story for Today, yet.

Wi-Fi Security


You can syndicate our news using the file backend.php or ultramode.txt


All logos and trademarks in this site are property of their respective owner. The comments are property of their posters, all the rest © 2003-2008 by Clement Dupuis and Nathalie Lambert (Site Maintainers).

 


 

 


Page Generation: 0.78 Seconds