policeledintelligence.wordpress.com
A New Hope… | Police-Led Intelligence
https://policeledintelligence.wordpress.com/2013/12/24/a-new-hope
A New Hope…. Posted on 24 December 2013. Dave Aitel has graciously allowed us to run his commentaries before – see Hackers May Help Choose The Next US President. And Aitel On Cyberwar. Dave is the founder and Chief [Security technology executive][1] Officer of Immunity, Inc. And runs the Daily Dave mailing list. Where this article was originally published. It is re-published here with his kind permission. The rebirth of managed security services. Pointed out much of what has come out. The most obvious an...
start-hacking.blogspot.com
Learn To Hack Ethically: Exploitation
http://start-hacking.blogspot.com/p/exploitation.html
Learn To Hack Ethically. Lets clear our tracks. Exploitation phase is where we will take control of the victims machine. It can be done in many ways but for now we will demonstrate a one simple attack and I will just give you other resources later. Before we demonstrate, let me first give you a brief meaning of vulnerability, payload and exploits. Exploits - It is a piece of code that can take advantage of the vulnerability found in a particular application. The tool that we will gonna use is Metasploit.
sectools.org
Vulnerability exploitation tools – SecTools Top Network Security Tools
http://sectools.org/tag/sploits
Suggest a new tool. SecTools.Org: Top 125 Network Security Tools. For more than a decade, the Nmap Project. Has been cataloguing the network security community's favorite tools. In 2011 this site became much more dynamic, offering ratings, reviews, searching, sorting, and a new tool suggestion form. This site allows open source and commercial tools on any platform, except those tools that we maintain (such as the Nmap Security Scanner. And Nping packet manipulator. In 2009 and it soon sprouted commercial...
seclists.org
Daily Dave Mailing List
http://seclists.org/dailydave
Daily Dave Mailing List. This technical discussion list covers vulnerability research, exploit development, and security events/gossip. It was started by ImmunitySec. Founder Dave Aitel and many security luminaries participate. Many posts simply advertise Immunity products, but you can't really fault Dave for being self-promotional on a list named DailyDave. Re: Latency is a demogorgon. A fun question to ask is, *why wasn't that Cisco ASA remote patched? Because EQGRP didn't tell Cisco about it, duh.
specialopssecurity.com
Special Ops Security || Company
https://specialopssecurity.com/company/partners
Authorized SBA 8(a) Minority-Owned Small Disadvantaged Business · Terms of Use. Middot; Privacy Policy.
securitytheatre.wordpress.com
Securitytheatre's Weblog | <scr…. ahem. heh. | Page 2
https://securitytheatre.wordpress.com/page/2
Scr…. ahem. heh. More pen test resources. Have been burning money with Amazon again. Damn you Amazon shakes fist . I have to say the Penetration Tester’s Open Source Toolkit rocks. It really does. I have to get back to it now🙂, but before I do…. I also really like The Web Application Hackers Handbook. I don’t even care I had to get a new copy: it was absolutely worth it, and we are very happy together. Http:/ sourceforge.net/project/showfiles.php? October 10, 2008. More Columbo than Bond. October 4, 2008.
securityresourcecenter.com
Page Links
http://www.securityresourcecenter.com/private/sites.htm
Open Source Vulnerability Data Base. Uniras - Unified Incident Reporting and Alert Scheme - UK. Centre for internet security. Http:/ www.cisecurity.org/. Http:/ www.activeworx.org]. Http:/ www.bleedingsnort.com]. Open Source Vulnerability Data Base. Http:/ www.securityspace.com/smysecure/catid.html? Http:/ www.netsys.com/. Http:/ www.networkintrusion.co.uk. Http:/ www.ntsecurity.nu/. Http:/ www.astalavista.net/members. Http:/ paris2k.at.box.sk/. Http:/ www.zone-h.org/en/defacements.
hypersec.co.uk
HyperSec Consulting Group
http://hypersec.co.uk/products.php
We have the license to distribute certainly products to make Automated Pentesting, Vulnerability Assesment, and checking th entire network infraestructure. Vulnerability Assesment and Automated Pentesting tool, from immunity INC. Only in EUA and Mexico. Perpetue, Updates every 3 months. Request a demo to ImmunitySec (USA). Request a demo to HyperSec Consulting Group (Mexico and Lat). Http:/ www.canvas.hypersec.co.uk. Http:/ www.immunitysec.com/CANVAS/. Network Vulnerability Assesment Tool. ViruSNORT 1000...
hypersec.co.uk
HyperSec Consulting Group
http://hypersec.co.uk/partners.php
Our partners are divided in two regions Technical and Comercial :. Become a technical or Businesses partner here. Security and CANVAS developer. Canvas Developer, Consultant Deployer and Associate Consultant Services. United States of America. Http:/ www.immunitysec.com/contact.html. Http:/ www.immunitysec.com/. Cryptographic applications and security overral. Http:/ www.se46.se/index.php? Http:/ www.se46.se/. 46 708 93 23 24. Security Patches and Secure Infraestructure Implementations.
SOCIAL ENGAGEMENT