eLearnSecurity Blog

Blog

Here’s to Jumpstart and/or Strengthen your Core IT Security Skills

A strong foundation and perfect understanding of basic skills are the most important things for any IT Security professional. eLearnSecurity covers these essentials and much more in the Student Penetration Testing training course. You surely know the ins and outs of IT Security, but a refresher is always tactical.

Tags: , ,

Read more

ARES launching on 24th of September 2013 – Join us

The ARES launch video is out – The mystery got solved! Our brand-new training course, called ARES, is launching on September 24. The FREE launch-event has the highest  number of registrations we ever had, check out why and get your special invite here …

ARES – The New eLearnSecurity Training Course

You find details about ARES and the option to book your FREE seat for the launch event.

Tags: , , ,

Read more

Black Hat HACK.ME event round-up

On January 17th I had the privilege to present the HACK.ME project during a Black Hat Webcast with Travis Carelock as moderator and Karl Snider from IBM as sponsor of the event.

BlackHatLogo

Hack.me, that we launched in October 9th during a live event with the Ethical Hacker Network community, is the platform where the commuinty can build and share with others, full-fledged vulnerable web applications.

Read more

Hack.me – House of the rising Sandbox

Yesterday we’ve announced our craziest project ever. We’ll release it on October 9th.
(Why crazy? Subscribe to our RSS)

If you still don’t know about it, please check it out here.

Ever since the first time I envisioned a platform where vulnerable web applications could be created and shared much like you do with a Mobile App on the Apple Store, me and Domenico Quaranta (@domequaranta), creator of Coliseum, would relentlessly put down notes and ideas on how this platform should have looked like.

Tags: ,

Read more

Nessus and Metasploit: Scan networks in pivoting

Tools: Nessus, Metasploit, Nmap, proxychains.

Attention: In our tests proxychains works only on 32 bit Backtrack 5

One of the best features that Metasploit offers is the ability of “pivoting”.  With this technique, an attacker can use a compromised machine as a “pivot” to attack other machines in the same or in other networks that the compromised host can reach.

Tags: , , , ,

Read more

Join me in a Live webinar on our PTP2

Two months after the release of our Penetration testing course Professional v2, it’s time to uncover all the details and fantastic learning opportunities of our training course and Hera lab.

On May 29th I will personally walk you through our Penetration testing course and Virtual Labs, giving a live demo and answering all your questions (Yes you can ask live questions).

Read more

Go to top of page