There’s a new video in our Youtube channel.
We are keeping up with our promise to deliver one free pentesting video every week.
So if you have not subscribed yet:
The new video will deal with Msfpayload, a handy utility shipped with Metasploit that lets you use shellcodes (payloads) and builds stand alone executables around them.
What’s new today? We have just opened our Youtube channel! And the best part is that we will host video tutorials and live hacking examples done by our students, for our students.
Someone says that the best way to learn is by teaching.
We’ve heard your suggestions, we’ve applied a number of bug fixes and improvements to our first version of the Penetration testing course Professional and released another updated version of our course:
It is amazing to see how many people are willing to employ much of their spare time noting down bugs and improvements.
In eLearnSecurity everyone is passionate about security. From the gatekeeper to the managers.
We always try to involve friends and other passionate practitioners to join our projects and when we can’t, we just support their projects wholeheartedly.
Manu Zacharia newly winner of the prestigious ISC2 Asia Pacific Information Security Leadership Achievements Award, organizer of the c0c0n conference 2010, is a good friend of eLearnSecurity and has picked our courses as the exclusive Prize sponsor for the Catch the Flag contest.
Penetration testing course – Pro has probably the most complete and comprehensive coverage of System Security among the penetration testing training courses online.
Vipin Kumar and Nitin Kumar, authors of the system security section, covered shellcoding step by step and in great details.
Sky isn’t falling but big Antivirus firms are lying as well.
I have already written about the Khobe 8.0 research which headlines have hit almost all the security related websites and blogs: “New malware can bypass all AV’s”.
I just came across Graham Cluley‘s blog post on dark reading and Sophos’s Paul Ducklin blog post.
Now we are in trouble. A research from Matousec has revealed a means by which a hacker would be capable of disabling dozens of modern AV’s including McAfee, Symantec and friends.
The method, developed by software security researchers at matousec.com, works by exploiting the driver hooks the anti-virus programs bury deep inside the Windows operating system.
Thank you Google! A new and very effective way to learn web application security from the developer point of view has been announced: Jarlsberg .
The application is a vulnerable web application coded in Python that pentesters or web developer can try to hack from different perspectives: Black box testing, White hat testing through code inspection (addressed to Python coders)
To get the most out of this lab, you should have some familiarity with how a web application works (e.g., general knowledge of HTML, templates, cookies, AJAX, etc.).
Our first review is out. And it is a stellar third party unbiased review.
eLearnSecurity – What CEH should have been by Jason Haddix for Ethical Hacker.net
Yeah, we reached our goal of going one mile wide and one mile deep!
When I called the two friends Brett and Vipin, to coauthor the Penetration testing pro I didn’t mean to work one full year, night and day. All of us had our 8-5 job, university, families and eventually girlfriends.
We wanted to make a different course, but at the very beginning we didn’t know where we were about to land.