All Posts Tagged Tag: ‘penetration testing’

  • Kali Iso Of Doom2

    Kali Linux ISO of Doom

    In our last blog post, we provided an example of running an unattended network installation of Kali Linux. Our scenario covered the installation of a custom Kali configuration which contained select tools required for a remote vulnerability assessment using OpenVAS and the Metasploit Framework.

    Read More →
  • Kali Linux Offsec Blog

    BackTrack Reborn – Kali Linux

    It’s been 7 years since we released our first version of BackTrack Linux, and the ride so far has been exhilarating. When the dev team started talking about BackTrack 6 (almost a year ago), each of us put on paper a few “wish list goals” that we each wanted implemented in our “next version”. It soon became evident to us that with our 4 year old development architecture, we would not be able to achieve all these new goals without a massive restructure, so, we massively restructured and “Kali” was born. We’ve also posted a Kali Linux teaser on the BackTrack Linux site – and that’s all we’ll say for now…

    Read More →
  • Peensy Post

    Advanced Teensy Penetration Testing Payloads

    In one of our recent engagements, we had the opportunity to test the physical security of an organization. This assessment presented an excellent scenario for a USB HID attack, where an attacker would stealthily sneak into a server room, and connect a malicious USB device to a server with logged on console, thus compromising it. From here, the “Peensy” (Penetration Testing Teensy?) was born.

    Read More →
  • Word Header V2.3

    Sample Penetration Test Report

    There are two different ways of doing things in this InfoSec world we are in. We can chase the money, or we can focus on doing what we feel is right. Then do that with passion. At Offensive Security, it has always been about doing …

    Read More →
  • St Kitts Caribbean Reviews 2

    Live Training in St. Kitts and Nevis

    Our recent Penetration Testing with BackTrack Live Training in St. Kitts was a great success. This was the first time that we have done the class in the Caribbean, and we were really curious to see how it would go – as there is no …

    Read More →
  • Osx Exploit Paul

    Evocam Remote Buffer Overflow on OSX

    This guide comes from my own journey from finding a buffer overflow in an OS X application to producing a working exploit. I have reasonably good exploit development skills having completed the Penetration Testing with BackTrack and Cracking the Perimeter training courses, and working on several buffer overflow exploits. The majority of my exploit development skills are based around Windows vulnerabilities and using the OllyDBG debugger.

    Read More →
  • Bt R1

    BackTrack 4 R1 Dev Public Release

    As promised, we are releasing a BackTrack 4 R1 information security and penetration testing development build to the public for hardware testing.

    Read More →
  • 2634

    BackTrack 4 Release 1 (R1 Dev)

    The release of BackTrack 4 unleashed a whirlwind of over 1 million downloads. Information Security specialists and Penetration Testers from all over the world showing their support and love for the product that has become the #1 Penetration Testing Distribution.

    Read More →
  • Pentesting Real World

    Penetration Testing in the Real World

    Penetration Testing in the real world. If you are tired of “Hacking with Netcat” webcasts or “Penetration Testing with RPC DCOM”, then this movie is for you. It’s a quick reconstruction of a Security Audit we preformed over a year ago, replicated in our labs. …

    Read More →
  • 10 Questions

    How to choose your Information Security Training

    In the past couple of years, the economy has struck hard on organizations seeking to educate their employees. Training budgets have been cut down, and choosing the right course that will give you real Return on Investment is not an easy job. This is especially …

    Read More →