eLearnSecurity Blog

Tag: webinar

Stepping Through Your First Web App Penetration Test

If you’ve been: a) thinking of taking matters into your own hands and testing your own web apps; b) trying desperately to get your bug bounty ranking up; or c) taking a web app pentesting course and in need of some clarifications to be addressed, then it would be in your very best interest to join us on June 27th 2017, at 1PM ET for our fifth technical webinar this 2017: Stepping Through Your First Web App Penetration Test.

Tags: , , , , , , , ,

Read more

Fuzzing for Security and Stability

Strap on your boots, because on March 21st, 2017 1:00 PM ET, eLearnSecurity is taking you hunting in our latest webinar. This time, we’re bringing you a live demonstration of real-world vulnerability hunt, where we’ll see how a fuzzing test could’ve identified and prevented the havoc caused by the infamous Heartbleed bug.

Tags: , , , , , , , ,

Read more

Effectiveness of Automated Web Security Scanners: Netsparker

Mark your calendars: this February 28th 2017, the Netsparker and eLearnSecurity teams will unite to host the technical webinar, Effectiveness of Automated Web Security Scanners. The event – kicking off at 1 PM ET – will be hosted by none other than Netsparker’s Product Architect, CEO, and founder, Ferruh Mavituna.

Tags: , , , , , , , , , ,

Read more

See through the eyes of a Pentester – Live Pentesting Scenario in Hera Lab

We’re now in the midst of 2017, and to kick off the year right, we decided to get down and dirty and go back to the basics. On January 24th – as promised – we’re going to get technical and bring all of you behind the scenes of a real-world penetration test in See through the eyes of a Pentester – Live Pentesting Scenario in Hera Lab.

Tags: , , , , , , , ,

Read more

Video: Sneaky Man in the Middle Attack Demo

sneaky MITM attack webinar

A Man in the Middle (MITM) attack is a type of attack where the hacker gets in the middle of a communication between the victim and the server/service.

Our rockstar IT security researcher, Davide “GiRa” Girardi, shows you how to launch an advanced Man in the Middle (MITM) attack even if the network is using static ARP tables or if dynamic ARP inspection is enabled.

Tags: , , , , ,

Read more

Go to top of page