News

Cyber Europe 2014 high res

Cyber Intelligence Europe 2014

Brussels, Belgium 22nd September 2014 – 24th September 2014   With the ever growing threat of cyber-attacks on government critical infrastructure there is no better time to come together and discuss the latest threats being seen to breach public sector…

international-154119_640

How to Use Multiplayer

How to Use Multiplayer  Metasploit with Armitage Metasploit is a very cool tool to use in your penetration testing: add Armitage for a really good time. Penetration test engagements are more and more often a collaborative effort with teams of…

monitor-68156_640

How to use Sqlploit

How to use Sqlploit   Databases nowdays are everywhere, from the smallest desktop applications to the largest web sites such as Facebook. Critical business information are stored in database servers that are often poorly secured. Someone an to this information…

security-265130_640

Write Your Own Debugger

Write Your Own Debugger by Amr Thabet Do you want to write your own debugger? … Do you have a new technology and see the already known products like OllyDbg or IDA Pro don’t have this technology? … Do you…

F7

Playing with the Ports Redirection

Playing with the Ports Redirection by Davide Peruzzi Whether you are performing a penetration test or that your goal is to debug an error in your complicated corporate network or, why not, to bypass control of a very restrictive firewall…

binary-139838_640

What is Reverse Engineering

What is Reverse Enginering by Aman Singh Reverse engineering as this article will discuss it is simply the act of figuring out what software that you have no source code for does in a particular feature or function to the…