Offensive Security Blog

  • Kali Recipe Offsec

    Kali Linux Recipes

    A couple of days ago, we received an e-mail from a university professor asking for advice regarding Linux distributions to be used in his security 101 classes. In its default configuration, Kali Linux wasn’t a 100% match for his needs, which were quite specific:

    Read More →
  • Kali Trademarks

    Kali Linux Trademarks

    It’s been a year since we’ve released Kali Linux, and we’re happy to see it succeed. Kali has surpassed BackTrack Linux in many ways and the community is responding accordingly. Between the improved development cycle, more attentive support, and larger community, Kali Linux has reached new heights of popularity. This popularity however, does not come without its own issues. One of the big problems we’ve been facing in the past year is rampant violations of our Kali Linux Trademarks.

    Read More →
  • Kali Custom Raspberry Pi 1

    Generating Kali Raspberry Pi Images

    Kali Linux Raspberry Pi Image Updated!” That was supposed to be the “tweet” we would release, telling everyone our new Kali Linux Raspberry Pi image was supposedly better than our old one. We often update our followers with news like this on twitter, and this tweet would be no different. However, this time, we thought it would be interesting to tell you about the mechanics of updates like these, and shed some light on how these “news items” come about. This post will also give us the opportunity to describe the process of running our custom Kali Linux ARM build scripts, by way of a story. If you couldn’t care less about this story, and just want the updated image – head straight to our Kali Linux Custom Image page!

    Read More →
  • Edb Github Blog

    Exploit Database Hosted on GitHub

    We have recently completed some renovations on the Exploit Database backend systems and moved the EDB exploit repository to Github. This means that it’s now easier than ever to copy, clone or fork the whole repository. The previous SVN CVS has been retired.

    Read More →
  • Bug Bounty Insights1

    Bug Bounty Program Insights

    With the nature of our business, we at Offensive Security take our system security very seriously and we appreciate the benefits of having “the crowd” scrutinize our internet presence for bugs. For this reason, we recently started our own Bug Bounty Program, which provides incentives for researchers to inform us of possible vulnerabilities in our sites in exchange for cash rewards.

    Read More →
  • Pwk Blog Post

    Penetration Testing with Kali Linux – Online Course Update

    Over a year ago, when we first sat down and began on what would become Kali Linux, we realized that with all the major changes, we would also need to update our flagship course, Penetration Testing with BackTrack (PWB), to be inline with Kali Linux. With the release of Kali, we ensured that we mentioned the impact this would have on PWB and that an update to the course was in the works.

    Read More →
  • NDProxy

    NDPROXY Local SYSTEM exploit CVE-2013-5065

    In the past few days there has been some online chatter about a new Windows XP/2k3 privilege escalation, well documented by FireEye. Googling around, we came across a Twitter message which contained a link to a Chinese vulnerability analysis and PoC.

    Read More →
  • Kali Bh Seattle

    Penetration Testing with Kali Linux at Black Hat Seattle Dec 9th-12th

    We are proud to announce that we will be teaching Penetration Testing with Kali Linux at Black Hat’s December event in Seattle Washington. This will be the second time we will be teaching this class live.

    Read More →
  • Offsec Megacorp Report 1

    Penetration Test Report 2013

    We are proud to release a new, updated, sample penetration test report. This report accurately reflects the types of assessments we conduct for our clients. It incorporates changes we have made over the last two years based on customer feedback, as well as reflecting many of the types of attacks we have found to be effective in multiple customer environments.

    Read More →
  • Kali Iso Of Doom2

    Kali Linux ISO of Doom

    In our last blog post, we provided an example of running an unattended network installation of Kali Linux. Our scenario covered the installation of a custom Kali configuration which contained select tools required for a remote vulnerability assessment using OpenVAS and the Metasploit Framework.

    Read More →
Page 1 of 1412345»10...Last »