There’s a new video in our Youtube channel.
We are keeping up with our promise to deliver one free pentesting video every week.
So if you have not subscribed yet:
The new video will deal with Msfpayload, a handy utility shipped with Metasploit that lets you use shellcodes (payloads) and builds stand alone executables around them.
What’s new today? We have just opened our Youtube channel! And the best part is that we will host video tutorials and live hacking examples done by our students, for our students.
Someone says that the best way to learn is by teaching.
We’ve heard your suggestions, we’ve applied a number of bug fixes and improvements to our first version of the Penetration testing course Professional and released another updated version of our course:
It is amazing to see how many people are willing to employ much of their spare time noting down bugs and improvements.
In eLearnSecurity everyone is passionate about security. From the gatekeeper to the managers.
We always try to involve friends and other passionate practitioners to join our projects and when we can’t, we just support their projects wholeheartedly.
Manu Zacharia newly winner of the prestigious ISC2 Asia Pacific Information Security Leadership Achievements Award, organizer of the c0c0n conference 2010, is a good friend of eLearnSecurity and has picked our courses as the exclusive Prize sponsor for the Catch the Flag contest.
Vipin Kumar and Nitin Kumar, authors of the system security section, covered shellcoding step by step and in great detail.
Khobe may not pose an imminent threat, but don’t trust the PR spin from Antivirus companies
I have already written about the recent Khobe 8.0 research. Headlines have hit almost all the security-related websites and blogs: “New malware can bypass all AV’s”.
New Research suggests cyber criminals can now easily bypass anti-virus software on almost all Windows operating systems
Now we are in trouble. Research from Matousec has revealed a means by which a hacker would be capable of disabling dozens of modern AV’s including McAfee, Symantec, and friends.
Google announced new tool for pentesters and web application ethical hackers.
Thank you, Google! A new and very effective way to learn web application security from the developer’s point of view has been announced: Jarlsberg (link no longer available).
The vulnerable application created by Google is coded in Python and was created for pentesters or web developers to practice hacking from different perspectives such as black box testing and whitehat testing through code inspection (addressed to Python coders).
With a little help from our friends in cyber security, eLearnSecurity’s latest pentesting course now has a release date.
When I called two friends, Brett and Vipin, to coauthor the Penetration Testing Professional training course, I didn’t intend for them to work one full year, night and day.