A complete guide to securing a website

December 18th, 2010 | by NJ Ouchn

To secure a website or a web application, one has to first understand the target application, how it works and the scope behind it. Ideally, the penetration tester should have some basic knowledge of programming and scripting languages, and also web security.

PacketFence v2.0.0 released

December 17th, 2010 | by NJ Ouchn

PacketFence is a fully supported, trusted, Free and Open Source network access control (NAC) system

JavaSnoop v1.0 Final available

December 17th, 2010 | by NJ Ouchn

A tool that lets you intercept methods, alter data and otherwise hack Java applications running on your computer

NIST releases Special Publication 800-137

December 17th, 2010 | by NJ Ouchn

NIST announces the release of Draft Special Publication 800-137 (initial public draft), Information Security Continuous Monitoring for Federal Information Systems and Organizations

CSA Cloud Controls Matrix V1.1 is Released

December 17th, 2010 | by NJ Ouchn

The Cloud Security Alliance Cloud Controls Matrix (CCM) is specifically designed to provide fundamental security principles to guide cloud vendors and to assist prospective cloud customers in assessing the overall security risk of a cloud provider

Cisco IOS Penetration Testing with Metasploit

December 17th, 2010 | by NJ Ouchn

Source: Blog Rapid7 The Metasploit Framework and the commercial Metasploit products have always provided features for assessing the security of network devices. With the latest release, we took this a step further and focused on accelerating the penetration testing process for Cisco IOS devices

Back to Top ↑