eLearnSecurity Blog

Monthly Archives: May 2010

Malware can bypass all Windows based AV’s

Now we are in trouble. A research from Matousec has revealed a means by which a hacker would be capable of disabling dozens of modern AV’s including McAfee, Symantec and friends.

The method, developed by software security researchers at matousec.com, works by exploiting the driver hooks the anti-virus programs bury deep inside the Windows operating system.

Tags: ,

Read more

Jarlsberg – A web app testing lab from Google

Thank you Google! A new and very effective way to learn web application security from the developer point of view has been announced: Jarlsberg .

The application is a vulnerable web application coded in Python that pentesters or web developer can try to hack from different perspectives: Black box testing, White hat testing through code inspection (addressed to Python coders)

To get the most out of this lab, you should have some familiarity with how a web application works (e.g., general knowledge of HTML, templates, cookies, AJAX, etc.).


Read more

Go to top of page