• LOGIN
  • No products in the cart.

Workshop

28

Nov'16

Malware Analysis using Volatility – Workshop eBook

Dear Readers, We would like to proudly present to you the newest Hakin9 workshop issue. In this eBook you will …

Read More

28

Nov'16

Malware Analysis using Volatility – Workshop eBook Preview

Dear Readers, We would like to proudly present to you the newest Hakin9 workshop issue. In this eBook you will …

Read More

14

May'16

Hack with Python – Workshop eBook

Dear readers,  We present a new e-book, containing workshop materials from HACK WITH PYTHON COURSE. We would like to share them with …

Read More

14

May'16

Hack with Python Workshop eBook – Preview

Dear readers,  We present a new e-book, containing workshop materials from HACK WITH PYTHON COURSE. We would like to share them with …

Read More

22

Mar'16

Snort IDS – Workshop eBook

Dear readers,  We present a new e-book, containing workshop materials from SNORT IDS BLAST COURSE. We would like to share them …

Read More

24

Nov'15

Advanced Offensive Security – Workshop eBook – Part 1

Dear Readers,  We present a new ebook, containing workshop materials from our Advanced Offensive Computer Security Training. We’re proud of …

Read More

17

May'15

Backend Database Hacking – Workshop eBook

We will be extremely focused on talking about tricks and techniques used for hacking into databases and underlying operating system. We will also lay down the general and core concepts for understanding the databases, like how they work, why they are used and what are the known vulnerabilities or weaknesses to exploit and gain illegitimate access. Microsoft SQL Server and MYSQL server are the two main database servers we will be discussing.

Read More

17

Apr'15

Attacking Network Device – Workshop eBook

You will gain experience in attacking network devices. However, it would be difficult to cover all of these devices in one workshop but we will cover as much as we can. You must have these devices running in your lab or you should have authorization to perform such attacks in order to evaluate the security blueprint of the network you are attacking.

Read More