Content tagged as 'Penetration-Testing'

Here is a list of all the content that has been tagged as penetration-testing.

Holistic Info-Sec for Web Developers

A three part book series focused on lifting the security knowledge of Software Developers, Engineers, and their teams, so that they can continuously deliver secure technical solutions on time and within budget, without nasty surprises.

Haroon Meer on Network Security

Haroon Meer talks with Kim Carter about network security on Software Engineering Radio.

Talk - The Art of Exploitation

At JS Remote Conf: Kim examines and demonstrates a collection of essential attacks, commonly used in the exploitation and demise of many individuals and organisations today.

Talk - The Art of Exploitation

At NZ.JS: Kim examines and demonstrates a collection of essential attacks, commonly used in the exploitation and demise of many individuals and organisations today.

Workshop - Windows Exploitation and Persistence with PowerShell

The common payload takes the user supplied shellcode and overwrites the first 0x1000 bytes of the calling instance of PowerShell, creates a thread to execute within the virtual address space of the calling PowerShell instance and starts it. All delivery and persistence techniques ensure AV bypass of shellcode. Kim has dissected and will explain how the virus and payload works. We will look at delivery mediums (virus): Compiled C executable Office document (take your pick) C/- Nishang Persistence mediums:

Talk - Agile Security for Web Developers

Join Kim at AgileNZ 2016 for an exploration into an insightful set of steps he has learned, from an architectural, engineering and penetration testing perspective.

Talk - Agile Security for Web Developers

Join Kim at Agile Professionals Network for an exploration into an insightful set of steps he has learned, from an architectural, engineering and penetration testing perspective.

Talk - Agile Security for Web Developers

Join Kim at CodeCamp Christchurch for an exploration into an insightful set of steps he has learned, from an architectural, engineering and penetration testing perspective.

Security Review, Penetration Testing

You need to be sure that what your development team(s) are creating is going to withstand the onslaught of those tasked with breaking your deliverables, and stealing your customers data.

Your customers want to be certain that their personal data is secure. You need your product to stand-up to those that are going to attack it.

TL-WN722N on Kali VM on Linux Host

Redirects to legacy blog post.

The following is the process I found to set-up the pass-through of the very common USB TP-LINK TL-WN722N Wifi adapter (which is known to work well with Linux) to a Virtual Host Kali Linux 1.1.0 (same process for 2.0) guest, by-passing the Linux Mint 17.1 (Rebecca) Host.