portal.securityroots.com
Template and methodology library | Security Roots User Portal
https://portal.securityroots.com/extras/resources
Security Roots User Portal. A little help to get you started. Download and use these report templates. To be productive from day one. Use Dradis notes for your conclusions, sort your findings by severity, make use of document properties for things like project and client name, etc. Advanced reporting: filters, groups and properties. A fancy HTML report. Not everything is Word! You can create comprehensive HTML reports with charts and detailed issue descriptions. Creating Word reports with DradisReports.
securitybytes.blogspot.com
Security Bytes: July 2011
http://securitybytes.blogspot.com/2011_07_01_archive.html
Computer security news tips and general computer advise. If you have a computer related question please post a comment or e-mail me and I will try to answer you the best that I can. Sunday, July 24, 2011. I just finished reading a new book from some of the guys at Offensive. Metasploit: The Penetration Tester's Guide. And all I can say is that it is amazing. Be sure to check it out and get yours from Amazon.com. Or your favorite bookseller. Overall I give this book a 4 out of 5 stars only because I wish ...
securitybytes.blogspot.com
Security Bytes: Metasploit Book Unleashed
http://securitybytes.blogspot.com/2011/07/metasploit-book-unleashed.html
Computer security news tips and general computer advise. If you have a computer related question please post a comment or e-mail me and I will try to answer you the best that I can. Sunday, July 24, 2011. I just finished reading a new book from some of the guys at Offensive. Metasploit: The Penetration Tester's Guide. And all I can say is that it is amazing. Be sure to check it out and get yours from Amazon.com. Or your favorite bookseller. Overall I give this book a 4 out of 5 stars only because I wish ...
stefanfriedli.ch
Es dauerte vier Jahre, den Begriff “Penetration Testing” zu definieren. – Stefan Friedli
http://www.stefanfriedli.ch/2015/03/es-dauerte-vier-jahre-den-begriff-penetration-testing-zu-definieren
Type your search terms above and press return to see the search results. Es dauerte vier Jahre, den Begriff “Penetration Testing” zu definieren. Am 26 März 2015 erschien das Penetration Testing Guidance des PCI Security Standards Council in dem der Penetration Testing Execution Standard. Als offizielle Referenz zur Definition und Durchführung von Penetration Tests genannt wird. Ein kurzer Rückblick. Viele grundlegende Probleme der Informationssicherheit liegen der hohen Komplexität, technisch wie auch st...
cryptedsecurity.com
Penetration Testing Execution Standard - PTES - Crypted Security
http://cryptedsecurity.com/penetration-testing-ptes
Penetration Testing Execution Standard – PTES. May 15, 13 • Ethical Hacking. Bull; No Comments. Bull; Read More. Penetration Testing Execution Standards – PTES. Before, we talked about the aspects of pen-testing. For instance, the basic steps for pen-testing defined by the standards are as follows:. So if you’re New to pen-testing and want to learn more about PTES, visit: http:/ www.pentest-standard.org/. All of these steps will be simulated in our future content. Latest posts by Ali Muhammad ( see all.
blog.7-a.org
Abraham Aranguren's blog: January 2014
http://blog.7-a.org/2014_01_01_archive.html
Infosec blog about anything security-related I get my hands on :). Monday, 13 January 2014. OWTF 0.45.0 "Winter Blizzard" released! OWASP OWTF is always looking for contributors, feedback and new ideas. If you find a bug or have an idea about what OWTF could do, please tell us in our github issue tracker. This is another a very significant release which includes the continued outstanding work of:. The 4 x OWASP OWTF GSoC 2013 projects -including post-GSoC improvements- (Sponsored by Google. WARNING: This...
blog.7-a.org
Abraham Aranguren's blog: August 2013
http://blog.7-a.org/2013_08_01_archive.html
Infosec blog about anything security-related I get my hands on :). Sunday, 25 August 2013. AppSec EU: OWASP OWTF Summer Storm slides, demos and Plug-n-Hack support! UPDATE 04/09/2013: Added link to AppSec EU video. UPDATE 26/08/2013: Added Plug-n-Hack support link. OWASP AppSec EU 2013. Were both a blast this week:. I would like to use this opportunity to let you know that:. Is always actively looking for contributors. Bug reports / ideas. OWASP OWTF supports the Plug-n-Hack mozilla standard now. This is...
in-security.org
EP034 In-Security podcast shownotes
http://in-security.org/ep034
An information security podcast, from the ground up. Open Source Security Architecture Group. Music provided by: Denis Kreynin https:/ soundcloud.com/denis-kreynin. Originally Recorded March 11th 2015. This week Rob Fuller (a.k.a. Mubix) joins us to discuss his new Open Source Security Architecture Group. On the way to covering that topic we cover a bunch of other projects Rob has been involved with, including:. Hak5’s Metasploit Minute. How to win at CCDC (Blue team guide). 8211; Episode 029a. Software ...
pcsympathy.com
PC Sympathy - Your Source for PC News And Technical Support - Page 5 of 341
http://www.pcsympathy.com/page/5
Qubes OS 3.1 Overview/Demo. March 20, 2016 – 10:26 AM. Here is an excellent overview of Qubes OS. Which I am mostly converting over to for my everyday operating system. What is Qubes OS? From it’s own website:. Https:/ www.qubes-os.org/. Pwn2Own 2016: Chrome, Edge, and Safari hacked, $460,000 awarded in total. March 19, 2016 – 11:14 AM. Of the trio, Chrome fared the best. Two attempts were made to hack Google’s browser: One failed and one was deemed a partial success. The successfully exploited v...In wh...
SOCIAL ENGAGEMENT