Welcome to The Professional Security Testers Warehouse for the CEH V7 GPEN CPTS CREST GCIH GREM OPST
Search
Nickname Password Security Code Security Code Type Security Code  
Become a Cyber Warrior get the CEH V8 now
FITSI the certification program for the federal workforce

We recommend:

Best hacking and penetration testing  magazine in the world

Video Library

Skimming for ID theft
5 / 2
Views: 233
Comments: 16
11-01-2008 05:18

Latest version of ATM skimmer hidden behind a speaker looking device
5 / 3
Views: 248
Comments: 11
11-01-2008 05:11

ATM Scam, do check your ATM machine before using it
5 / 2
Views: 226
Comments: 12
11-01-2008 04:59

Survey

Whic of the following certifications would you like to get?

GPEN
GCIH
CEH
CREST
GREM
GSEC
CISSP
Security+
Other (please leave a comment)



Results
Polls

Votes 529

Who's Online

There are currently, 436 guest(s) and 31 member(s) that are online.

You are Anonymous user. You can register for free by clicking here
The Professional Security Testers Warehouse for the CEH V7 GPEN CPTS CREST GCIH GREM OPST: Training

Search on This Topic:   
[ Go to Home | Select a New Topic ]

CISSP CBT Tutorial for the BCP and DRP domain of the CBK
Posted by cdupuis on Friday, 08 August 2014 @ 22:04:41 CEST (498 reads)
Topic Training

Anonymous writes "

Dear members,

The CCCure Learning Portal  is our new Learning Portal and it will eventually replaced CCCure.org.   The CCCure.Org has lots of legacy, it has some spammer posting within articles, and it is due for retirement.   Over the next months we will migrate the relevant content of CCCure.Org to CCCure.Training.  So far I have developed 38 Hours of thorough Computer Based Tutorial and I will continue over the next week as well.

You can visit the new site at:  The CCCure Learning Porta


Good day to all,

I have never read as many NIST standards, books, and documents as I did over the past two weeks.  I am on a roll and well on my way to cover all of the domains of the CBK.  The most important ones are mostly done.  The next one on the list will be Security Architecture and Design.

I am pleased to say that I have just uploaded my BCP and DRP CBT tutorial to the site a few minutes ago.   It is a complete CBT that covers 100% of all exam objectives.  You have 2 hours and 6 minutes of thorough coverage.

This is one of the TOP 5 Domains for you exam.  This is the a domain that will make you pass or fail the exam.  It counts for about 12% of the whole exam.  You must master this domain.

With this domain completed, we now have a total of more than 38 hours of tutorial, covering 5 of the most important domains.  All the tutorials are developed by CCCure/Clement the owner and founder of CCCure.  They are all  available on on the web site to all of our Silver and Gold members. 

If you wish to upgrade your account from Standard to either Gold or Silver it is very easy.  Simply visit http://cccure.training/index.php and login with your account.  After you are logged in visit the link below and you will see our subscription options:
http://cccure.training/m/memberships/

FOR OUR GOLD AND SILVER MEMBERS

The tutorials are available to Gold and Siver members at:

http://cccure.training//m/articles/browse/category/CISSP+Online+CBT

The MP3 files were uploaded as well and you can download them to listen while mobile on the road.  You will find the MP3 files at: 

http://cccure.training/m/articles/view/MP3-Files-for-all-ten-domains

Please take a minute to send me some feedback.  I always appreciate to hear from members.

Enjoy!

Clement

"

(Read More... | Score: 0)


What's New in the Retina 4.5 Release (Webinar)
Posted by cdupuis on Friday, 31 May 2013 @ 09:26:20 CEST (1243 reads)
Topic Training

Wed, Jun 5, 2013 1:00 PM - 2:00 PM EDT Webinar Registration

Retina is the only vulnerability management platform designed from the ground up to provide IT security for professionals with context-aware vulnerability assessment and risk analysis. Retina’s results-oriented architecture works with users to proactively identify security exposures, analyze business impact, and plan and conduct remediation across network, web, mobile, cloud and virtual infrastructure. Join our team and see what's coming up in our latest release. In this 60 minute webinar we will cover:

• Dynamic Auditing Capability (Vulnerability Smart Groups)
• Enhanced Data Discovery
• New Reporting
• Policy Deployment through Retina CS
• Session Monitoring
• File Integrity Monitoring

With the most powerful reporting and analytic capabilities in its class, Retina makes it easy to make smart decisions, effectively communicate risk, and report vulnerability management progress to executives and compliance auditors. Built to scale and perform in large environments, Retina provides centralized command and control over assessments of disparate and heterogeneous infrastructure. Over 10,000 customers worldwide rely on Retina to enable visible, measurable and actionable vulnerability management across their organizations.

REGISTER NOW AT:  https://www1.gotomeeting.com/register/987964985

 


(Read More... | Score: 0)


Webinar: CompTIA Advanced Security Professional (CASP)
Posted by cdupuis on Monday, 13 May 2013 @ 16:47:54 CEST (1672 reads)
Topic Training

Here is a webcast you don't want to miss.

My friend Eric Conrad will be doing a webcast tomorrow on the new CASP Certification from CompTIA.

Visit the link below to register:


On the exciting side, The CASP was added to DoD 8570 for the following roles:
IAT level III
IAM II, and
IASAE level I and II.

You can see the updated 8570 list of approved certifications at:


Here is the latest list of approved certs on the graphic below:

DoD Approved 8570 Baseline Certifications
DoD Approved 8570 Baseline Certifications

(Read More... | Score: 0)


Become a Cyber Warrior and get an iPad mini
Posted by cdupuis on Wednesday, 19 December 2012 @ 10:07:51 CET (1227 reads)
Topic Training

Anonymous writes "

Boost your skills and career marketability with an award winning boot camp from SecureNinja and for a limited time receive Apple's new iPad mini! It's bigger than an iPhone, but smaller than an iPad—it's iPad mini. With a 7.9-inch screen, this device shouldn't give you any visibility issues, but it also won't be a burden in your hand.

Become a Cyber Warrior and get an iPad mini

"

(Read More... | Score: 0)


CISSP Boot Camp Abu Dhabi, UAE and Doha, Qatar
Posted by cdupuis on Thursday, 25 October 2012 @ 23:47:32 CEST (1355 reads)
Topic Training

Anonymous writes "
The Abu Dhabi and Doha classes are coming up very soon
cccurelogo.png Open Information System Security Group
 
There are only a few weeks before the Abu Dhabi, UAE and Doha, Qatar CISSP® boot camps led by Clement Dupuis.   There are still a few seats left.  Our classes have small number of students which allow for great interaction with your instructor and one on one discussions.  Clement is always available before, during, and after class.

Our curriculum is updated with the latest Common Body of Knowledge (CBK®) content.  
go  CISSP® Boot Camp Abu Dhabi, UAEabu dhabi mosque3.jpg 18 - 22 November , 2012
CISSP® Boot Camp Abu Dhabi - Led by Clément Dupuis
Click on link above for all of the details
go  CISSP® Boot Camp Doha, Qatardoha qatar skyline3.jpg 24th - 28th November 2012
CISSP® Boot Camp Doha - Led by Clément Dupuis
Click on link above for all of the details
go  You get access to the CCCure Quiz engine and the CISSP® File Share

Every student will be given access to the CCCure Quiz Engine for 180 Days.  The CCCure Quizzes will give you a very unique advantage, It is the most comprehensive database of questions that you can find to prepare and pass the exam on the first trial.  Students will be given access as soon as they register for the class.

Every student will also get acces to Clement's private CISSP® Prep file share with practice quizzes, exam cram, videos, scenario based questions, tutorials on topics of the CBK®, and the full boot camp recorded for your convenience.  You can listen to any of the domain after the class to further learn each of them.   You get access to the file share and the recordings for 180 Days.  Student will get the URL for the file share on the first day of class.

Clement is the maintainer of www.cccure.org which is known as the #1 CISSP® portal on the planet.   Over 135,000 members have used Clement`s resources to prepare for their security exams.   Clement brings over 35 years of IT and Security experience into the classroom.  There is noboby that knows the CISSP® CBK® better than Clement who has delivered this boot camp over 200 times in more than 25 countries over the past 13 years.  He's really a master of the CISSP® certification.

Our amazing passing rate of more then 90% of our students on the first trial speak for itself.

You can visit the Quiz Engine at:  https://www.freepracticetests.org/quiz/index.php?page=home

You can visit the OISSG website at:  http://www.oissg.org/ 

 
"

(Read More... | Score: 0)


Pen Tests Evolved: The Advanced Threat Cycle
Posted by cdupuis on Thursday, 09 February 2012 @ 11:40:05 CET (1935 reads)
Topic Training

Anonymous writes "
You're Invited: Penetration Testing Webcast

Date:  Tuesday, February 14, 2012
Time: 2pm US Eastern Time (GMT -4:00, New York)
Host:  Dave Shackleford, Voodoo Security

*** A recording of the webcast will be sent to everyone who registers, so be sure to sign up even if you can’t make the live session. ***

Over the last few years, we've heard a lot of discussion in the security community about "advanced threats". Whether persistent or not, the attackers are using a vast arsenal of techniques to compromise systems and steal data, some newer and more cutting-edge, while others are more tried and true. No matter your opinion on the "APT", the attacks are happening and organizations are losing data left and right. How can you determine your susceptibility to these attacks? There's no one answer to this, but proactive security assessments that emulate some of the attackers' methods can help you to pinpoint your weak spots.

During this presentation, Dave Shackleford will cover:
  • The advanced threat cycle, and what attack techniques and tools are seen most frequently
  • What most internal pen testing teams are doing today, and why it may not be adequate for today's threat landscape
  • How internal pen testing teams can switch up their normal testing regimens to better represent advanced threats to organizations
  • Tips for how to prevent and detect advanced malware as part of your assessment program

Click here to register
 http://ws.coresecurity.com/PenTestsEvolved.html 

*** A recording of the webcast will be sent to everyone who registers, so be sure to sign up even if you can’t make the live session. ***

Best Regards, 
Core Security
"

(Read More... | Score: 0)


Security Kaizen Magazine Issue 4 is released
Posted by cdupuis on Friday, 03 February 2012 @ 14:58:28 CET (1993 reads)
Topic Training

Security Kaizen Magazine Yearly issue.
An issue that you shouldn't miss

In Egypt : 30 % discount Coupon for EC council Courses inside the Printed Copy.

Printed Copy Request
Coming Soon : Arabic Version



(Read More... | Score: 0)


LACSEC 2012, May 6-11, 2012, Quito, Ecuador
Posted by cdupuis on Monday, 16 January 2012 @ 12:43:47 CET (1878 reads)
Topic Training

*****************************************
                      CALL FOR PRESENTATIONS
*****************************************
                           LACSEC 2012
      7th Network Security Event for Latin America and the Caribbean
                 May 6-11, 2012, Quito, Ecuador
            http://lacnic.net/en/eventos/lacnicxvii/


LACNIC (http://www.lacnic.net) is the international organization based in (Uruguay) that is responsible for administrating IP address space, Reverse Resolution, Autonomous System Numbers and other resources for the region of Latin America and the Caribbean on behalf of the Internet
community.

The 7th Network Security Event for Latin America and the Caribbean will be held in Quito, Ecuador, within the framework of LACNIC's seventeenth annual meeting (LACNIC XVII). This is a public call for presentations for that event.

The topics of interest include, but are not limited to, the following:

* Honeypots, network monitoring and situational awareness tools in general.
* Fighting spam, particularly spam from origin (SPF, DKIM and related technologies. Email reputation)
* Fighting phishing and pharming
* Fighting malware
* Internet protocol security
* IPv6 security
* DNSsec
* Security of network infrastructure services (DNS, NTP, etc.)
* Web security
* DoS/DDoS response and mitigation, botnets
* Authentication and access control
* Security in the cloud
* Protection of critical infrastructure
* Security in mobile systems
* Computer security incident response teams (CSIRTs): creation, management, experiences
* Security in corporate environments, compliance and auditing, return on security investments
* Security management (procedures, operational logs, records, etc.)
* Risk management in Information Security
* Computer forensics
* Protection of privacy
* Legal aspects relating to computer security


Guidelines for Presenting Proposals

Proposals for the 7th Network Security Event for Latin America and the Caribbean (LACSEC 2012) must be presented taking into account the
following considerations:

* The proposal may consist of a paper, or (alternatively) an Extended Abstract plus a draft version of the slides to be used for the presentation.
* Proposals may be presented in English, Portuguese or Spanish.
* Proposals must be submitted in Portable Document Format (PDF)
* Submissions must be created directly using a word processing system (scanned articles will not be accepted)
* Presentations may not be longer than 30 minutes.


Submitting a Proposal

Those interested in presenting at LACSEC 2012 must send the following information to <[email protected]> within the deadlines set
forth below:

* Full title of the presentation
* A paper or, alternatively, an Extended abstract and a draft of the slides to eb used for the presentation. The paper should not be longer than 10 pages. The extended abstract should not contain more than one thousand (1000) words. The Evaluation Committee may, at its sole discretion, request additional or  omplementary information.
* Full name, email address and organization with which the author (or authors) of the submission is affiliated

For more information, please don't hesitate to contact the Evaluation Committee at <[email protected]>.


Proposal Evaluation

The Evaluation Committee that has been created for this purpose will evaluate proposals based on the following basic criteria:

* Originality
* Technical quality
* Relevance
* Presentation
* Applicability


Speaker's Privileges

LACNIC will cover the registration fee for those authors whose presentations are accepted. Speaker travel and accommodation expenses, however, will not be covered.

Presenters who require financial assistance to attend the event may apply for the LACNIC Financial Assistance Program. Please read the corresponding instructions <http://lacnic.net/en/eventos/lacnicxvii/>.  In no case does applying for the sponsorship program guarantee that financial assistance will be granted. For more information please contact LACNIC staff at <[email protected]>.


IMPORTANT DATES

* Deadline for proposal submission: February 15th, 2012
* Notification of acceptance: February 27th, 2012
* Deadline for submitting the final version the presentation: May 6th, 2012

7th Network Security Event for Latin America and the Caribbean (LACSEC 2012)

Chair
 Fernando Gont (SI6 Networks/UTN-FRH, Argentina)

Evaluation Committee
 Iván Arce (Argentina)
 Lorena Ferreyro (Consultora Independiente, Argentina)
 Javier Liendo (Cisco, Mexico)
 Carlos Martinez Cagnazzo (LACNIC, Uruguay)
 Reinaldo Mayol (Universidad Pontificia Bolivariana, Colombia)
 Domingo Montanaro (iSight Partners, Brazil)
 Jose Miguel Parrella Romero (Debian developer, Ecuador)
 Patricia Prandini (ADACSI, Argentina)
 Javier Romero (JaCkSecurity, Peru)
 Arturo Servin (LACNIC, Uruguay)
 Liliana V. Solha (CAIS/RNP, Brazil)
 Leonardo Vidal (ISOC Capitulo Uruguay, Uruguay)

- --
Fernando Gont
SI6 Networks
e-mail: [email protected]

(Read More... | Score: 0)


Live Online CISSP Boot Camp at 1/2 the price of our Live Classroom Boot Camp
Posted by cdupuis on Wednesday, 21 December 2011 @ 21:55:15 CET (1673 reads)
Topic Training

Anonymous writes "
CISSP ® LIVE OnLine
Secure Ninja cccure.org
Get Certified and Save Big with Secure Ninja's Buy One Get One Promo
  • Accessible from any Location
  • No Daily Commute in traffic
  • No Airfare Fees
  • No Hotel fees
  • Same quality of delivery as a brick and mortar class
  • All sessions are recorded
  • Listen as many times as you wish
  • Do it from the comfort of your home
  • Let Clement guide you to success (pre-present-post mentoring)
  • 5 Day CISSP Immersion Training
  • Award Winning Proprietary Curriculum
  • Highest CISSP Exam Pass Rates
  • Day, Evening,Weekend & Live Online classes to meet your busy schedule
  • Pre/Present/Post Class Paid Account to CCCure Quiz Engine (World's best CISSP 2000+ exam questions)
  • Exclusive CISSP Scenario Based Exam Questions
  • Get DoD 8570.1-M CISSP Compliant
  • WIA (Workforce Investment Act) Approved
  • Veterans Benefits & GI Bill Approved - Welcome Military!
  • Option to resit  Live Online CISSP class for up to one (1) year
Clement Dupuis, CD
Your Live Online mentor Before, During & After class
Secure Ninja @ Linkedin See Us @ Youtube Like us on Facebook Fallow us Twitter

Get Live Online Instructor Led Learning for 1/2 the price of our Classroom Based Boot Camps.
Book it Now
Class is filling fast. Call Enrique to secure your seat today.

Phone: +1 703 535 8600 x16
Mobile: +1 305 467 7436

[email protected]

Secure Ninja
901 North Pitt St. Suite 105
Alexandria, VA 22314
  Phone: 703.535.8600
Fax: 703.535.8656
Email : [email protected]
"

(Read More... | Score: 0)


Call for Papers -YSTS 6 - Security Conference, Brazil
Posted by cdupuis on Monday, 12 December 2011 @ 19:27:03 CET (2518 reads)
Topic Training

Anonymous writes "

YSTS 6th Edition
Sao Paulo, Brazil
May 7th, 2012

Call for Papers Opens:  December 10th 2012
Call for Papers Close:   February 26th 2012
http://www.ysts.org
@ystscon

INTRODUCTION

After 5 very successful editions we are off to the 6th edition of the
you Sh0t the Sheriff security conference and we are sending this off
so you send us the coolest stuff you've been working on.
The conference will happening on May, 7th, 2012 in Sao Paulo, Brazil.
This is your chance to speak about that cool research you’ve been
working on, to those whom matter in the Brazilian Information Security
realm.

ABOUT THE CONFERENCE

you Sh0t the Sheriff is a very unique, one-day, event dedicated to
bringing cutting edge talks to the top-notch professionals of the
Information Security Community in Brazil.

The conference’s main goal is to bring the attendees to the most
up-to-date state of the information security world by mixing
professionals and topics from different Infosec segments of the
market.

yStS is a very exclusive, mostly invite-only security con. Getting a
talk accepted, will, not only get you to the event, but after you
successfully present your talk, you will receive a challenge-coin that
guarantees your entry to yStS for as long as the conference exists.

Due to the great success of the previous years' editions, yes, we're
keeping the same
format:

* YSTS 6 will be held at an almost secret location only announced to whom
it may concern a couple of weeks before the con
* the venue will be, most likely, a very cool club or a bar
(seriously, see pictures)
* appropriate environment to network with great security folks from
Brazil and abroad
* since it’s a 1 day con with tons of talks, we provide to everyone
coffee, lunch and booze


CONFERENCE FORMAT

Anything Information Security related is interesting for the
conference, although we strictly do not accept commercial/
product-related pitches. Keep in mind though, this is a one-day
conference, we receive a lot of submissions, so please do your best in
sending new / coolest research.

Just in case you need some ideas, some of the topics in security that
could be interesting to us:

 * Mobile Devices
 * Social Netwoking Threats
 * Embedded Systems
 * Social Networking and Client-Side Techniques
 * Red Team Techniques
 * Inside Jobs Detection/ Techniques
 * Operating Systems
 * Career & Management topics
 * (cool and useful) Information Security Policies
 * Privacy in the Digital World
 * Messing with Network Protocols
 * 802.11 Wireless and any RF related stuff for that matter
 * Authentication
 * Incident Response Stories and Policies
 * Information Warfare
 * Malware/ Botnets
 * DDoS Evolution or Stories
 * Secure Programming
 * Hacker Culture
 * Application Security
 * Virtualization
 * DataBase Security
 * "the" Cloud
 * Cryptography
 * System Weaknesses
 * Infrastructure and Critical Systems
 * Reverse Engineering
 * Social Reverse Engineering
 * Reversing Social Engineering
 * Caipirinha and Feijoada Hacks
 * and everything else information security related that our attendees
would enjoy, the coolest/ different/ most creative submissions win,
keep that in mind!

We do like shorter talks, so, please submit your talks and remember
they must be 30 minutes long. (yes, we do strictly enforce that)

We’re also opened to some 15-minute talks, some of the smart people
around might not need 30 minutes to deliver a message, or it might be
a project that has been just kicked-off.
15 minutes might be your thing and that's nothing to be ashamed about.

you Sh0t the Sheriff is the perfect conference to release your new
projects, other people have released very cool research before they
presented it at the bigger cons.
And yes, we do prefer new hot-topics and, yes, "first-time" speakers
are more than welcome.
If you got good stuff to speak about, that's all that matters.

SPEAKER PRIVILEGES
(and, that applies only to the 30 minute-long talks)

* USD 1,000.00 to help covering travel expenses for international speakers
* Breakfast, lunch and dinner during conference
* Pre-and-post-conference official party (and the unofficial ones as well)
* Auditing products in traditional Brazilian barbecue restaurants
* Life-time free admission for all future yStS conferences (yes, if you 've
spoken before at yStS, you have your free-entry guaranteed, just buy us a
beer, ohh, wait, it's free anyways, isn't it?)


CFP IMPORTANT INFO (aka: what do we need from you)

Each paper submission must include the following information:

 * Abstract/ Presentation Title
 * Summary or abstract for your presentation
 * Your Name, company/title, address, email and phone/contact number
 * Short biography and qualification
 * Speaking experience
 * Do you need or have a visa to come to Brasil?
 * is it a 30 minute or a 15 minute talk?
 * Technical requirements (others than LCD Projector)
 * Other publications or conferences where this material has been or
  will be published/submitted.


VERY IMPORTANT DATES

Final CFP Submission - February 26th, 2012
Final Notification of Acceptance - March 26th, 2012
Final Material Submission for accepted presentations - May 3rd, 2012


All submissions must be sent via email, in text format only to: cfp/at/ysts.org

IMPORTANT CONTACT INFORMATION

Paper Submissions:              cfp/at/ysts.org
General Inquiries:              b0ard/at/ysts.org
Sponsorship Inquiries:  sponsors/at/ysts.org


OTHER STUFF

website www.ysts.org
YSTS 5 video clip http://tinyurl.com/ysts5clip
pictures of last con http://tinnyurl.com/ysts5pix1
video channel http://ysts.blip.tv/
twitter @ystscon
official twitter hashtag #ystscon

We hope to see you there!

Luiz Eduardo & Nelson Murilo & Willian Caprino
http://www.ysts.org

"

(Read More... | Score: 0)


SecureNinja declared co-winner of SC Magazine 2012 Awards
Posted by cdupuis on Wednesday, 09 November 2011 @ 09:37:57 CET (1702 reads)
Topic Training

Anonymous writes "

Good day Ninja’s,

We are proud to announce that Secure Ninja has been declared co-winner of  SC Magazine 2012 Awards for Best Professional Information Security Training Program.  

That is the 2nd award within a 1 month period for Secure Ninja! 

At Hacker Halted a week ago we won the prize for Best Newcomer ATC of the year.

We would like to thank all our students, instructors, partners, and supporters who made this possible.

We look forward to continue serving you throughout 2012 with the same commitment to quality of delivery and content.

Best regards

Clement

 

Best Professional Information Security Training Program

SC Magazine winner of best security training award

Best Newcomer Authorized Training Center (ATC) of the year from EC-Council


  Best ATC of the year from EC-Council at hacker halted

"

(Read More... | Score: 0)


ClubHack Magazine Issue 21- October 2011 has been Released
Posted by cdupuis on Monday, 10 October 2011 @ 15:11:52 CEST (2637 reads)
Topic Training

Hello Readers,

Here are with the Issue-21, October 2011 of ClubHack Magazine.

This issue covers following articles:-

0x00 Tech Gyan - Low Profile Botnets
0x01 Tool Gyan - Demystifying the Android Malware
0x02 Mom's Guide - MALDROID
0x03 Legal Gyan - Law relating to Child Pornography in India
0x04 Matriux Vibhag - WEBSECURIFY
0x05 Poster - Bhag Bhag PC Bose

Check http://chmag.in/ for articles.

PDF version can be download from:- http://chmag.in/issue/oct2011.pdf

Hope you'll enjoy the magazine.

Send us your feedback and articles at [email protected]

Regards,

Abhijeet Patil,
Co-Founder, CHMag
URL: http://chmag.in
    http://clubhack.com
Cell: +91-99238-00379


(Read More... | Score: 0)


PenTest Magazine October Issue is out!
Posted by cdupuis on Friday, 07 October 2011 @ 10:43:09 CEST (2300 reads)
Topic Training

 

October Issue is out! Buy 1 year PenTest Subscription and Recieve PenTest for 2 Years! Get 50% Discount on Full HISPI Library Access and More!

Read October issue! Fuzzing for Pentesters

Protocol fuzzing has been a popular technique for bug discovery with a number of tools, books and papers describing the benefits and drawbacks. Although typically used for bug discovery in a lab environment, there are opportunities to use fuzzing in a penetration testing role too.
by JOSHUA WRIGHT

Read more in October issue of PenTest Magazine!

Download October Issue Now, or if somehow you are not subscribed yet, do it now!, or if you need to get convinced for subscribing, see the free teaser!

What's more:

  • Web Application Fuzzing and Positive Validation by Prasanna Kanagasabai & Kartikeya Puri, where authors gives us some essential knowledge about Application Web Fuzzing.
  • Fuzzing in a Penetration Test by Joshua Wright - get convinced by Josh, that fuzzing can be used in a wide range of ways.
  • Fuzzing as the Art for Security Testing By Aniket Kulkarni. Author's first flavor, which focuses on knowing Fuzzing conceptually and explaining fuzzing in definitions, history and what are Fuzzers.
  • Introduction to exploit automation with Pmcma by Jonathan Brossard, who made a serious efforts to provide you all the details concerning this tool, that you might need.
  • Common Database Issuses to Look at in Penetration Testing, by Srinivasan Sundara Rajan, is the article, where author tells you about the things common for Penetration Testing and Database branches.
  • The Art (and Necessity) of the On-Site Social Engineering Audit by Shane Macdougall, where Shane focuses on Social Engineering in general, but he also speaks about On-Site Attacs.
  • Interview with David Vaughn by Aby Rao, where he talks with David about his career, and shares with us with some of the David professional experiences.

Buy 1 Year PenTest Subscription and Recieve PenTest for 2 Years!

Buy 1 Year PenTest Subscription and Recieve PenTest for 2 Years!

Not yet subscribed to PenTest Magazine? Don't hesitate and buy annual subscription yet today! If you will buy PenTest annual subscription until 12:00 am (GMT +1) on the 14th of October, you will get next year subscription FOR FREE

PAY FOR ONE - GET TWO! 48 instead of 24 PenTest issues. Sounds good?

Don't wait, the offer is valid until 12:00 am (GMT +1) on 14.10.2011!

CLICK HERE TO SUBSCRIBE



Please spread the word about PenTest.
Enjoy reading!

Maciej Kozuszek & PenTest team
[email protected]
www.pentestmag.com

(Read More... | Score: 0)


Takedowncon 2 - December 2-7 in Las Vegas
Posted by cdupuis on Tuesday, 04 October 2011 @ 10:38:34 CEST (1523 reads)
Topic Training

Takedowncon 2, December 2-7 in Las Vegas will focus on mobile & wireless security.

Takedowncon - organized by EC-Council - is a new series of topic-specific IT security events that takes deep technical dives into the hottest security segments.

The format consists of hands-on training, a two-day conference and exhibits.

TDC is designed for researchers, engineers and technical managers.  

Register early foe the best rates.

See details at:  www.takedowncon.com


(Read More... | Score: 0)


Issue19 of ClubHack Mag for the month of August 2011 has been released
Posted by cdupuis on Saturday, 13 August 2011 @ 16:34:16 CEST (2775 reads)
Topic Training

Hello All, here we are with issue19 of ClubHack Mag for the month of August 2011. Unlike other issues, this is not theme based!

This issue covers following articles:-
0x00 Tech Gyan - Gonna' Break It On Down Gonna' Kick It Root Down
0x01 Tool Gyan - SniffJoke – Defeating Interception Framework
0x02 Mom's Guide - RSA Security
0x03 Legal Gyan - Patent Law and Computer technology
0x04 Matriux Vibhag - SOCIAL ENGINEERING TOOLKIT
0x05 Poster of the Month.
Check http://chmag.in for articles.


PDF version can be download from:- http://chmag.in/issue/aug2011.pdf

Hope you'll enjoy the magazine. Please send your suggestions, feedback to [email protected]

Regards,
Abhijeet Patil,
ClubHack Mag
URL: http://chmag.in
htp://clubhack.com


(Read More... | Score: 0)


Our Sponsors

Login

Nickname

Password

Security Code:
Security Code
Type Security Code

Don't have an account yet? You can create one. As a registered user you have some advantages like theme manager, comments configuration and post comments with your name.

Latest Windows Tools

Currently there is a problem with headlines from this site

Latest Linux Tools

Currently there is a problem with headlines from this site

Reverse Engineering

Big Story of Today

There isn't a Biggest Story for Today, yet.

Wi-Fi Security


You can syndicate our news using the file backend.php or ultramode.txt


All logos and trademarks in this site are property of their respective owner. The comments are property of their posters, all the rest © 2003-2008 by Clement Dupuis and Nathalie Lambert (Site Maintainers).

 


 

 


Page Generation: 0.58 Seconds