Category Archive for: ‘Offensive Security’

  • Offsec Certifications

    Offensive Security Infosec Certifications in the Job Market

    A couple of weeks ago we published our comic Try Harder song, praising the OSCP certification and our students in general. It was really well received by our alumni, who related closely to the the theme of “Try Harder”. However, there is a more serious undertone to this than meets the eye.

    Read More →
  • Offsec Say

    Offsec Say – Try Harder!

    Offsec students go through hell. They endure levels of stress and frustration beyond what is considered normal, and we at Offsec appreciate this. So much in fact, that we’ve dedicated the following song to anyone who’s taken an Offsec course, and tried harder!

    Read More →
  • Offsec Happy Holidays 2014

    Happy Holidays from Offsec

    We at Offensive Security would like to thank all of our students, customers, and friends for a wonderful 2014. Its been a busy but productive year, with major upgrades to Kali Linux, the release of Kali NetHunter, the public launch of the hosted virtual labs, the first ever Kali Linux Dojo, upgrades to our student labs, lots of interesting R&D, a bunch of 0-days and a number of other accomplishments. We enjoyed the journey with all of you and here is to a fun and productive 2015! We wanted to thank you with this video we produced for all y’all.

    Read More →
  • Offsec Playground Blog Post

    Professional Penetration Testing Labs

    For the past few months, we have been quietly beta testing and perfecting our new “Offensive Security Penetration Testing Labs”, or as we fondly call it, the “Offsec Playground”. Today, we are proud to unveil our hosted penetration testing labs – a safe virtual network environment designed to be attacked and penetrated as a means of learning and sharpening your penetration testing skills. The new design of the “Offsec Playground” includes multiple interconnected subnets with a wide array of modern operating systems, including Active Directory domains, Citrix systems, corporate Antivirus solutions as well as Intrusion Prevention Systems which attackers must learn to cope with.

    Read More →
  • Nethunter Update 1.0.2

    Kali Nexus NetHunter 1.0.2

    It’s been a week since our release of the Kali Linux NetHunter, and the feedback is amazing. A NetHunter community has sprung up from nowhere, and the forums and github pages are really active. We’re completely stoked about this community response, and are eager to see it grow. After an intense week of community testing and a slew of bugfixes (including shellshock), we thought it would be a good opportunity to release a NetHunter update. Please welcome NetHunter 1.0.2.

    Read More →
  • Disarming Emet 5 0

    Disarming EMET v5.0

    In our previous Disarming Emet 4.x blog post, we demonstrated how to disarm the ROP mitigations introduced in EMET 4.x by abusing a global variable in the .data section located at a static offset. A general overview of the EMET 5 technical preview has been recently published here.

    Read More →
  • Disarming Emet

    Disarming Enhanced Mitigation Experience Toolkit (EMET)

    With the emergence of recent Internet Explorer Vulnerabilities, we’ve been seeing a trend of EMET recommendations as a path to increasing application security. A layered defense is always helpful as it increases the obstacles in the path of an attacker. However, we were wondering how much does it really benefit? How much harder does an attacker have to work to bypass these additional protections? With that in mind, we started a deep dive into EMET.

    Read More →
  • Edb Github Blog

    Exploit Database Hosted on GitHub

    We have recently completed some renovations on the Exploit Database backend systems and moved the EDB exploit repository to Github. This means that it’s now easier than ever to copy, clone or fork the whole repository. The previous SVN CVS has been retired.

    Read More →
  • Bug Bounty Insights1

    Bug Bounty Program Insights

    With the nature of our business, we at Offensive Security take our system security very seriously and we appreciate the benefits of having “the crowd” scrutinize our internet presence for bugs. For this reason, we recently started our own Bug Bounty Program, which provides incentives for researchers to inform us of possible vulnerabilities in our sites in exchange for cash rewards.

    Read More →
  • Pwk Blog Post

    Penetration Testing with Kali Linux – Online Course Update

    Over a year ago, when we first sat down and began on what would become Kali Linux, we realized that with all the major changes, we would also need to update our flagship course, Penetration Testing with BackTrack (PWB), to be inline with Kali Linux. With the release of Kali, we ensured that we mentioned the impact this would have on PWB and that an update to the course was in the works.

    Read More →
Page 1 of 612345»...Last »