+

Tagged With / 'penetration tester'

September 6, 2013

Magazine News NOTICE BOARD admin Comments Off
Hakin9_TBO_03_2013

Advanced BackTrack Set – Read Hakin9′s Best Step-by-step Tutorials and Gain Pentesting Ultimate Skills

Dear Readers, We are happy to tell you that our current edition concerns on the most known IT security linux distro – BackTrack. We decided this time to pick up the best articles and publish them as a big set devoted to the topic of pentesting. We hope these 20 articles which you will find […]

Read more

October 5, 2011

Events SecurityUniversity No Comments

OCTOBER 2, 2011 9/11 GI Bill allows non-dgree SU Q/ISP Classes

Leading Hands-on Q/ISP IS Graudate Certification & classes 9/11 GI BILL Approved Q/ISP CyberSecurity IS Certification Classes Q/ISP® Cert Exam CNSS 4011/4012/4013/4015/ 4016A Q/EH® Qualified/ Ethical Hacker Certification Q/SA® Qualified/ Security Analyst Pen Tester Cert. Q/PTL Qualified/ Penetration Tester License Q/FE® Qualified/ Forensic Expert Certification Q/ND® Qualified/ Network Defender Certification Q/ISP® Qualified/ Information Security Professional […]

Read more

August 25, 2011

penetration tester's open source cover

Review of Penetration Tester’s Open Source Toolkit

Review of Penetration Tester’s Open Source Toolkit 3rd Edition By Michael Munt www.syngress.com   There are so many different varieties of penetration testing tools available, and the commercial versions of these can be very expensive and not always that easy to use, this book will aid you in choosing certain types of tools for certain […]

Read more

August 24, 2011

9781597496278_Faircloth

Penetration Tester’s Open Source Toolkit, Third Edition

Penetration Tester’s Open Source Toolkit, Third Edition By Jeremy Faircloth Publisher: Syngress July 2011 U.S., August 2011 EMEA www.syngress.com Description Great commercial penetration testing tools can be very expensive and sometimes hard to use or of questionable accuracy. This book helps solve both of these problems. The open source, no-cost penetration testing tools presented do […]

Read more

July 23, 2011

9781597496117

Review of Practical Lock Picking

Review of Practical Lock Picking A Physical Penetration Tester’s Training Guide By Michael Munty www.syngress.com   Some of you are likely to be thinking what does Lock Picking have to do with IT Security but you need to think from a slightly different angle. All those physical security assessments are more than likely to involve […]

Read more

July 3, 2011

9781597496117

Practical Lock Picking

Practical Lock Picking By Deviant Ollam Publisher: Syngress August  2010 U.S.,  September 2011 EMEA www.syngress.com Description For the first time, Deviant Ollam, one of the security industry’s best-known lockpicking teachers, has assembled an instructional manual geared specifically toward penetration testers. Unlike other texts on the subject (which tend to be either massive volumes detailing every […]

Read more

June 15, 2011


Ask the Social Engineer: Exploitation of the Human OS – The Human Buffer Overflow

Total domination is the goal for a penetration tester in every pentest – To utterly hack the company and demonstrate their true exposure to malicious attacks. Obtaining code execution is the easiest and most direct way to reach this goal. Social Engineering professionals are no different. by Chris Hadnagy Comments

Read more

June 15, 2011

Exploiting Software

Hakin9 Extra 1/2011 – Exploiting Software

Ask the Social Engineer: Exploitation of the Human OS – The Human Buffer Overflow by Chris Hadnagy Total domination is the goal for a penetration tester in every pentest – To utterly hack the company and demonstrate their true exposure to malicious attacks. Obtaining code execution is the easiest and most direct way to reach […]

Read more

June 15, 2011

ninja cover

Review of Ninja Hacking

Review of Ninja Hacking Unconventional Penetration Testing Tactics and Techniques By Michael Munt www.syngress.com   This is an unusual title for a book that is being aimed at the Security community and when I first looked at it i thought it was someones attempt to bring some humour into the IT Security arena, then as […]

Read more

June 15, 2011

ninja cover

Ninja Hacking

Ninja Hacking By Thomas Wilhelm, Jason Andress Publisher: Syngress October 2010 U.S., November 2011 EMEA www.syngress.com Description Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today’s ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your […]

Read more

May 1, 2009


Hacking ASLR & Stack Canaries on Modern Linux

This article will demonstrate methods used to hack stack canaries and Address Space Layout Randomization (ASLR) on modern Linux kernels running the PaX patch and newer versions of GCC. Author: STEPHEN SIMS Source: Hakin9 5/2009 https://hakin9.org WHAT YOU SHOULD KNOW… Readers should have an understanding of standard stack based overflows on x86 architecture, as this article builds off […]

Read more

April 1, 2009


Hacking Through Wild Cards

This paper sheds light on the usage of wild characters that lead to hacking. The wild characters are used effectively in a different sphere. The inappropriate use of wild characters can lead to misconfiguration of parameters thereby resulting in a number of attacks. Authors: ADITYA K SOOD A.K.A OKN0CK Source: Hakin9 4/2009 https://hakin9.org WHAT YOU SHOULD KNOW… Basic […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa