26

Aug'14

Cyber Security, Warfare, Deterrence - Special eBook by William F. Slater, III

Cyber Security, Warfare, Deterrence - Special eBook by William F. Slater, III

Read More

26

Aug'14

Hakin9's Wireshark Compendium - 180 pages on Hacking Wi-Fi

Hakin9's Wireshark Compendium - 180 pages on Hacking Wi-Fi Released in 2013

Read More

26

Aug'14

Interview with Precise Biometrics. Phishing attack with Social Engineering Toolkit (SET)

Interview with Precise Biometrics. Phishing attack with Social Engineering Toolkit (SET)

Read More

26

Aug'14

An ultimate Set of Articles - PenTest Almanac 01/13

An ultimate Set of Articles - PenTest Almanac

Read More

26

Aug'14

Metasploit Framework Guide for PenTesters

Metasploit Framework Guide for PenTesters

Read More

25

Aug'14

BackBox Linux

Archive of the BackBox Linux Issues released in 2012

Read More

25

Aug'14

E-Discovery Legal Issues Guidebook

Archive of Pentent E-Discovery Legal Issues Guidebook released in 2012

Read More

25

Aug'14

IS Risk Assessment PT A&S

Archive of the IS Risk Assessment PT A&S Issue released in 2012

Read More

25

Aug'14

SCADA - A&S PenTest

Archive of SCADA - A&S PenTest Issue released in 2012

Read More

20

Feb'14

Workshop's eBook: Metasploit Framework. Run a fully functional lab environment for your penetration testing

How to apply the incredible capabilities of the Metasploit Framework in a comprehensive penetration testing and vulnerability assessment regimen, according to a thorough methodology for performing effective tests: have a fully working lab environment including Firewall, routers, exploitable servers, etc.; have a clear understanding and overview of all the tools available on the Metasploit Framework; perform advance penetration testing; develop and create your own tools on the Metasploit Framework.

Read More

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013