Offensive Security related posts
Our first modern warfare tournament against our students was… humbling. Don’t get me wrong, we had our victories, but all in all we left the grounds wounded and limping. Between getting blown up by RPGs, massacred by drones or carpet bombed by B52’s we didn’t have it easy. Unfortunately, this was all documented and very soon, the screenshots and youtube videos arrived. The ones voted the best, somehow involved me getting blown up, as you can see below.
Johnny here, again…I’m excited to announce that Muts and I will be co-presenting the second Pentesting With Backtrack course in December 3-7, 2012 in St. Kitts! I’m excited on a couple different levels. First, I’m excited to get back to St. Kitts. Maybe it’s the inner pirate calling me back to the Caribbean, or maybe it’s just that the place is so exotic and beautiful. I enjoyed the breathtaking views with white beaches, mountains and electric blue water so much that on some days I wonder why I haven’t just packed up and moved there.
Since the inception of our Advanced Windows Exploitation (AWE) course, our students (who are always searching for more pain) have been asking for an accompanying certification exam. We are very pleased to announce the launch of the Offensive Security Exploit Expert (OSEE) certification.
Want a chance to get even ? For years we have been running classes that take great joy in torturing our students. We ask a lot of you, and the classes and certifications prove it. However there is no way around it: Some times we can drive you nuts. Here’s your chance to get even, MW3-style.
In this final post of our PWB in the Caribbean series, Johnny picks up from where he left off in Part 4, reflecting on his experiences during the week and the impact it has had on him personally. Without further delay, we’ll let Johnny wrap up the series.
When we last left off in Part 3 of our series of posts on Johnny’s experience at our recent PWB in the Caribbean course, he was experiencing the highs and lows of exploit development, emerging triumphantly in the end. Part 4 picks up where we left off last time so we’ll let Johnny take it from here.
Quite often, people tend to wonder what it’s like to experience an Offensive Security live training course. At our most recent live Pentesting with BackTrack course in St. Kitts, we had in attendance, Johnny Long of Hackers for Charity and he was good enough to keep a journal of his experiences during the course.
At long last, our highly rated Wireless Attacks Course (Wi-Fu) has been updated to version 3! This is a major revision of the course with a complete restructure and redesign of the course content with a far broader range of attack techniques.
The Social Engineering Defcon 19 CTF For the last 2 years now, Social-Engineer.Org’s mission has been to raise awareness for social engineering. Security technology has not been able to stop the advances of attackers leveraging social engineering techniques in order to gain unauthorized access to global organizations and fortune 500…
In our spring tradition of live training we are happy to announce our official April 2011 Pentesting With BackTrack course in Columbia, MD. As usual we are keeping our classes small so if you are interested sign up as soon as possible before we are full.
We are happy to announce that Offensive Security will be sponsoring DerbyCon. DerbyCon is a new hacker conference located in Louisville Kentucky. Our goal is to bring back an old style, community driven hacker con chocked full of amazing talks, live events and all around fun. The idea for DerbyCon…
A recent video submission by Abysssec demonstrates the Internet Explorer CSS 0day currently rampaging – reliably working on Windows 7 and Vista. The exploit bypasses DEP and ASLR without the use of any 3rd party extensions. There doesn’t seem to be a lot of discussion going around this exploit, however…
It’s hard to believe that the social-engineer.org project began 14 months ago. This project started from a simple idea to build the world’s first framework for social engineers. In these 14 months, this project has grown into the leading resource for all real social engineering education. The CTF that…
An interesting submission in from the Exploit Database – a Godaddy workspace XSS vulnerability. Although we did not post it (live site), the vulnerability seems real, and definitely worth mentioning.