Yesterday we’ve announced our craziest project ever. We’ll release it on October 9th.
(Why crazy? Subscribe to our RSS)
If you still don’t know about it, please check it out here.
Ever since the first time I envisioned a platform where vulnerable web applications could be created and shared much like you do with a Mobile App on the Apple Store, me and Domenico Quaranta (@domequaranta), creator of Coliseum, would relentlessly put down notes and ideas on how this platform should have looked like.
Tools: Nessus, Metasploit, Nmap, proxychains.
Attention: In our tests proxychains works only on 32 bit Backtrack 5
One of the best features that Metasploit offers is the ability of “pivoting”. With this technique, an attacker can use a compromised machine as a “pivot” to attack other machines in the same or in other networks that the compromised host can reach.
Two months after the release of our Penetration testing course Professional v2, it’s time to uncover all the details and fantastic learning opportunities of our training course and Hera lab.
On May 29th I will personally walk you through our Penetration testing course and Virtual Labs, giving a live demo and answering all your questions (Yes you can ask live questions).
eLearnSecurity is proud to announce the immediate availability of the new Penetration Testing Course Professional v2 and the new Virtual Labs called Hera.
Version 1 of our training course has had over 2,000 students from 82 different countries in the world and professionals Military agencies and Fortune 50.
If you are wondering what happened since last post well, we’d need a full book to describe.
Nothing bad, all awesome things. Things got hectic and projects and opportunities for us endless.
This won’t forgive us for not being present on the blog but you know this is start-up life in a tough world like Information Security.
We have got new 9 minutes of pwnage for you to enjoy in our Youtube channel
Hello everyone, new week, new video.
Here you can see the difference between using staged and non staged shellcodes from a functional point of view and under the perspective of a pentester who wants to evade AV’s. Then we dive into msfencode and its usage to bypass AV’s.
There’s a new video in our Youtube channel.
We are keeping up with our promise to deliver one free pentesting video every week.
So if you have not subscribed yet:
The new video will deal with Msfpayload, a handy utility shipped with Metasploit that lets you use shellcodes (payloads) and builds stand alone executables around them.
What’s new today? We have just opened our Youtube channel! And the best part is that we will host video tutorials and live hacking examples done by our students, for our students.
Someone says that the best way to learn is by teaching.
We’ve heard your suggestions, we’ve applied a number of bug fixes and improvements to our first version of the Penetration testing course Professional and released another updated version of our course:
It is amazing to see how many people are willing to employ much of their spare time noting down bugs and improvements.