UA-90624906-1
capture_flag

Capture The Flag (CTF) competition

We will be running Capture The Flag (CTF) competitions a few times this year. Here are the particulars:   Location of game: Online Game Type: Team Network/Web Application/Programming Attack competition Game Play: Scoring via placing...
backtrack

Backtrack

Background to Backtrack You must have come across with the word Backtrack when it comes to hacking on Linux operating system. If you have never heard the word and further worked on...
nessus

Nessus

What is Nessus? Nessus is a renown software from Tenable Network Security. It specifies in monitoring and scanning for security vulnerabilities. The initial release of this software was free to use for...
windows_apploker

How to Bypass a Windows AppLocker?

Quick Background on AppLocker First, we need to get an insight into what an Applocker is and its mechanism before going through the technical details. AppLocker is basically a software from Microsoft that...
pentester

Web App Pentesting Night School

The primary focus of the class is transitioning from Network to Web App Pentesting Differences and similarities Learning the popular technologies and platforms in use today Manually Identifying & Exploiting Vulnerabilities SQL...
network pentesting

Pentester Candidate Program – January 2018

Pentester Candidate Program January 2018 On the 6th  of January 2018, Strategic Security will launch the Pentester Candidate Program. This program is designed to satisfy the basic requirements of a penetration tester....
FIREFOX PLUG-INS

FIREFOX PLUG-INS REVIEW – 2017

FIREFOX PLUG-INS EVERY SECURITY PERSONNEL NEEDS TO KNOW  Plug-ins, additional features in a browser, enhance the user experience. Firefox is one browser that supports a variety of plug-ins. These could include video...
Python

Python For InfoSec Professionals

Python For InfoSec Professionals Night Class This class aims at making students comfortable with using Python to perform simple IT Security tasks. Going beyond using other peoples’ tools in this field is...
Infosec Addicts

CYBERWAR: Advanced Offensive Cyber Operations

cyber Security Offensive Security CYBERWAR: Advanced Offensive Cyber Operations I'm writing this post to let you know that the new night class version of CyberWar: Advanced Offensive Cyber Operations course which is ready to...
PIVOTING TO THE INTERNAL NETWORK

PIVOTING TO THE INTERNAL NETWORK

Network Security Offensive Security Web App Security A few months ago I ran into WordPress on a penetration test. It was a generic web application security assessment, but in this case, I was able...