19

May'15

Workshop's eBook: Inside IDS Systems with SNORT and OSSIM. Learn the principles of intrusion detection process, algorithms used in IDS

Install Snort by yourself and make sure of detecting basic attacks; configure and run open-source Snort and write Snort signatures; configure and run open-source Bro to provide a hybrid traffic analysis framework; use open-source traffic analysis tools to identify signs of an intrusion; write your own rule for detecting concrete signatures in network traffic in SnortIDS or SurricataIDS; test anomaly detection preprocessor for Snort – PHAD; install OSSIM (opensource SIEM) and setup it to collect events. Setup event correlation; write tcpdump filters to selectively examine a particular traffic trait; use the open-source network flow tool SiLK to find network behavior anomalies; use your knowledge of network architecture and hardware to customize placement of IDS sensors and sniff traffic off the wire.

Read More

11

Apr'15

Workshop's eBook: Exploiting VoIP Systems. Understand the Session Initiation Protocol and Real Time Protocol

Understand the Session Initiation Protocol and Real Time Protocol: This issue will introduce the VoIP world to the reader, with a particular focus on the network protocols used by VoIP systems and the security holes belonging to them. The reader will see both theoretical and practical aspects about VoIP attacks and relatives countermeasures. Several activities will be explained step by step in the following lessons. In particular, after this workshop the reader will be able to: setting up a Private Branch eXchange (PBX) – such as Asterisk – and softphones – such as ZoIPer and X-Lite -, in order to set up a basic VoIP telephone call between two end points; understanding the Session Initiation Protocol (SIP) and Real Time Protocol (RTP). These are the two main network protocol and they’re used by all VoIP systems; knowing about several VoIP attacks and performing some of that.

Read More

22

Mar'15

Workshop's eBook: Journey In The World of The XSS. The mechanics behind Cross-Site Scripting vulnerabilities and attacks.

The mechanics behind Cross-Site Scripting vulnerabilities and attacks: detect and exploit XSS vulnerability; understand the real risk behind this kind of of vulnerability; impress your customers with awesome Proof of Concept far beyond the classic pop-up; useful Javascript functions to exploit XSS; write your first XSS exploit; detect the vulnerabilities that allow you to perform XPS attacks; common tools useful during a pentest to perform XSS attacks.

Read More

27

Feb'15

Pentest Open November'2014

Dear PenTest Readers! PenTest team is really delighted to declare a new issue of PenTest magazine. In this event, a …

Read More

03

Jan'15

GET YOUR FREE ARTICLE PACK TODAY!

Table of Contents:   1) Configuring your machine for Pentesting by Cristian Stoica 2) Pentesting Mobile by Longinus Timochenco 3) …

Read More

03

Dec'14

PENTEST OPEN 03/2014 | EXTRA TIPS AND ADVICES

Dear PenTest Readers!We have launched the last Open issue this winter. It is a great pleasure for us to star …

Read More

03

Oct'14

KALI LINUX TEASER

Dear PenTest Readers, We would like to present a new issue of Pentest Magazine. If you have heard about one of the most …

Read More

03

Oct'14

STEP BY STEP FROM FIREWALL BYPASSING TO VOIP HACKING – DOWNLOAD FOR FREE

Dear PenTest Readers, Our special spring edition of PenTest Magazine consists of a compilation of our TOP blog-articles. The subjects …

Read More

03

Oct'14

TITANIA: DEDICATED ISSUE | PENTEST OPEN

Dear PenTest Readers, This issue is an amalgamation of the technical advice, free tool information, industry views, product guidance, opinion …

Read More

14

Sep'14

Archive 2015

 749 View(s)  401 Download(s)  140.51 MBPlease login or Register to access downloadables Download

Read More

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013