background preloader

Penetration Testing and Vulnerability Analysis - Home

Penetration Testing and Vulnerability Analysis - Home
Application Security Application Security teaches students the fundamental technical skills required to identify and prevent appplication vulnerabilities. Students will learn to apply the theory and practice of code auditing; a process which includes learning how to dissect an application, discover security vulnerabilities, and assess the danger each vulnerability presents. We also discuss methods to support secure software development. Taught by a team of security industry experts, we cover the following topics:

Related:  Ethical Hacking

Blue For The Pineapple …. Background The WiFi Pineapple, was a device coined by the Hak5 ( Team back in 2008. Originally it was a hacked Fon/Fonera AccessPoint (AP) with Karma patches applied to hostapd. Infinity Exists I Got My Computer Back! June 4th, 2009 by Patchy It’s been several years,… but finally Patchy and his computer are reunited at last Download Here Posted in News, Vblog | 5 Fun things To Do on School Computers November 26th, 2010 I know it's been a while, but I'm reinstating my weekly blog post policy. This week will be about something I've wanted to write about for a while: School computers! They're just too easy to hack and do fun stuff with, especially because teachers are just so incompetent with technology sometimes.

Step-by-Step Reverse Engineering Malware: ZeroAccess / Max++ / Smiscer Crimeware Rootkit (quick plug – to all current & future reverse engineers – check out our Reverse Engineering Training Course. We’d love to publish your work next!) Part 1: Introduction and De-Obfuscating and Reversing the User-Mode Agent DropperPart 2: Reverse Engineering the Kernel-Mode Device Driver Stealth RootkitPart 3: Reverse Engineering the Kernel-Mode Device Driver Process Injection RootkitPart 4: Tracing the Crimeware Origins by Reversing the Injected Code IntroX86 Creator: Xeno Kovah @XenoKovah License: Creative Commons: Attribution, Share-Alike ( Class Prerequisites: Must have a basic understanding of the C programming language, as this class will show how C code corresponds to assembly code. Lab Requirements: Requires a Windows system with Visual C++ Express Edition.

Linux and Open source PortSpoof – An interesting anti-snooping tool for Linux - Vimperator Fool those who try to portscan your system! The Portspoof program is designed to enhance OS security through emulation of legitimate service signatures on otherwise closed ports. It is meant to be a lightweight, fast, portable and secure addition to the any firewall system or security infrastructure. The general goal of the program is to make the port scanning software (Nmap/Unicornscan/etc) process slow and output very difficult to interpret, thus making the attack reconnaissance phase a challenging and bothersome task I’ve found the concept behind this small program really interesting : instead of close all your ports with a firewall deceive the real ports, thus annoying the guys who are running portscan versus your server/computer.

Demolishing Ankit Fadia v 0.01 « Sandip's Blog We all know who Ankit Fadia is. He is self proclaimed child prodigy in ‘hacking’ , a self proclaimed ‘world famous’ expert is computer security and digital intelligence consultant (digital intelligence? Does he mean AI. I never heard this term getting used anywhere in print other than by Mr. Fadia though I agree its a perfectly meaningful amalgamation of the two official sounding words ‘digital’ and ‘intelligence’) . However that picture of Ankit Fadia is very likely untrue and let me present a few findings so that you can decide for yourself.

64 Things Every Geek Should Know If you consider yourself a geek, or aspire to the honor of geekhood, here’s an essential checklist of must-have geek skills. The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field.

Training This section of the web site provides security training resources for infosec professionals based in or around the Northern Virginia (NoVA), DC, and MD areas. If there are any mistakes or information we should add, please let us know through our Contact Us form. For recent posts regarding this information, see the Recent Posts area below.