Video: Safe Harbor for Hackers

Join the Disclose.io Movement!
Video and Slide Deck from EH-Net Live! April 2019
The Internet has an Auto-Immune Problem! It affects everyone on the planet, whether they’ve been the victim of a cyber-attack directly or not. Even those who have ne… Continue reading Video: Safe Harbor for Hackers

Book Review – Linux Basics for Hackers

With countless job openings and growth with no end in sight, InfoSec is the place to be. Many pose the question, “Where do I start?” Over his years of training hackers and eventual security experts across a wide array of industries and occu… Continue reading Book Review – Linux Basics for Hackers

Book Review: Hacking for Dummies 6th Edition

Hacking for Dummies by Kevin Beaver is an information security professional’s introduction to ethical hacking. It is 22 chapters of information ranging from definitions (kept to a minimum) to reporting findings and everything in between. It als… Continue reading Book Review: Hacking for Dummies 6th Edition

Webinar: Basics of IoT Hacking for the Career Pen Tester on Sept 27 2018

Register Now and Learn IoT Hacking Step-by-Step! Independent Security Evaluators (ISE), the people behind the IoT Villages of DEF CON, RSA, DerbyCon and more, will showcase live demos of hacking IoT devices, the methodology for repeatable success and c… Continue reading Webinar: Basics of IoT Hacking for the Career Pen Tester on Sept 27 2018

PXE Boot Attacks – Tradecraft Security Weekly #27

Network administrators often utilize Pre-boot Execution Environment (PXE) to rapidly deploy new systems on a network easily. Golden system images can be created with all the software and settings already in place for new systems. In this episode of Tra… Continue reading PXE Boot Attacks – Tradecraft Security Weekly #27

OSINT & External Recon Pt. 2: Contact Discovery – Tradecraft Security Weekly #26

During the reconnaissance phase of a penetration test being able to discover employee names and email addresses of an organization is extremely important. It is also important to do so as stealthily as possible. Using open-source techniques and tools i… Continue reading OSINT & External Recon Pt. 2: Contact Discovery – Tradecraft Security Weekly #26

Video: Bug Hunting as a Second Income

Video and Slide Deck from EH-Net Live! July 2018 When most think of selling bugs, they have visions of the underground hacking scene populated by nefarious characters using their 0-days for illegal activity. But what if you could get in on the bug hunt… Continue reading Video: Bug Hunting as a Second Income

WeirdAAL (AWS Attack Library) Basics from the Authors

The cloud is everything. Organizations have either moved completely to the cloud, have a hybrid approach, or are actively planning a cloud strategy. Penetration testers have always had to provide their services anywhere the client’s environment t… Continue reading WeirdAAL (AWS Attack Library) Basics from the Authors