Top 20 countries for best public WiFi in 2015 Create bar chartsLithuania has...
In this article we will look at the environment in which eForensics exists; the legal and regulatory regimes in which systems and cyber criminals operate. We perform forensic analysis on systems to investigate a crime and hopefully prosecute a criminal; but to do that we need to understand which laws and regulations have been broken. There are pitfalls in working out what laws and regulations are in operation for a particular context; as what is illegal in one regime may not be in another, and is it the law in the location of the system or the criminal that applies? The information here forms the underlying legal knowledge in the CISSP certification and underpins the International Information Systems Security Certification Consortium (ISC)2 body of knowledge.Read More
We will be extremely focused on talking about tricks and techniques used for hacking into databases and underlying operating system. We will also lay down the general and core concepts for understanding the databases, like how they work, why they are used and what are the known vulnerabilities or weaknesses to exploit and gain illegitimate access. Microsoft SQL Server and MYSQL server are the two main database servers we will be discussing.Read More
Blueprinting the Target 90/10 way Workshop by Raheel Ahmad. You will learn how to perform the blueprinting of your target network and how to perform active and passive information gathering. You will learn how to use Nessus and NeXpose Scanners for vulnerability scanning and how to utilize best of nmap scans and running script bases scans with NSE.Read More
Exploit Dev WINTEL Platform by Raheel Ahmad. You will learn how to exploit them to own the windows machine, how to write an exploit from scratch to a working exploit and how to discover vulnerabilities in the windows based applications.Read More
Web Application Hacking Techniques Workshop by Raheel Ahmad. You will learn how to discover vulnerabilities in the Web based applications, how to hack into any web application which is vulnerable to SQL injection attacks.Read More