trmm.net
Thunderstrike2 details - Trammell Hudson's Projects
https://trmm.net/Thunderstrike2_details
Mdash; Trammell Hudson's Projects. From Trammell Hudson's Projects. Thunderstrike 2: Mac firmware worm details. This is the annotated transcript of our DefCon 23. Talk, which presented the full details of Thunderstrike 2. The first firmware worm for Apple's Macs that can spread via both software or Thunderbolt hardware accessories and writes itself to the boot flash on the system's motherboard. The original slides. Are available. This page is still being edited and updated with additional links. Our coll...
mypacketstream.blogspot.com
Computer Malicious Adversaries: Open Security Training (Cousera/Khan Academy Likes)
http://mypacketstream.blogspot.com/2013/03/open-security-training-couserakhan.html
A blog which records my journey on researching computer security issues. Wednesday, March 27, 2013. Open Security Training (Cousera/Khan Academy Likes). This precious, heavily documented training materials have been shared. With videos, codes and slides, I strongly believe these are things that shouldn't be missed out! In the spirit of OpenCourseWare. And the Khan Academy. Those who can, teach.". For malware related topics, the study paths has been lined out, for example:. Check all the titles here.
grokpodcast.com
Grok Podcast | 139 - Segurança da Informação
http://www.grokpodcast.com/2015/06/11/episodio-139-infosec
O que é Grok? Sobre Rafael Rosa Fu. O que é Grok? 139 - Segurança da Informação. Voltamos a falar sobre Segurança da Informação. Com o Antônio Marques. Hoje vamos descobrir como é que funciona um teste de penetração, o famoso pentest. Vamos falar sobre a parte burocrática, os tipos de teste, como é o processo e mais. Também vamos falar de alguns malwares e programas que são usados nesses ataques e a onda de vulnerabilidades que vemos na mídia. Groke e divirta-se conosco :). Ou atráves do nosso RSS. Snort...
siceh.org
S|CEH:~# Izobraževanje
https://www.siceh.org/viri/izobrazevanje
Chmod x SLOVENSKI CERTIFICIRANI ETICNI HEKERJI.sh. Cyrary je nastal januarja 2015 in nudi obiskovalcem brezplačne tečaje iz področja administracije sistemov, administracije omrežij in informacijske varnosti. Poleg opravljanja tečajev lahko obiskovalci tudi prispevajo material ter sodelujejo v skupinah in na forumu. Nekateri tečaji obdelujejo posamezne teme znotraj informacijske varnosti, drugi pa so sestavljeni z namenom da posameznik pridobi znanje potrebno za opravljanje določenega certifikata. Image S...
exploitresearch.wordpress.com
Links | Exploit Research
https://exploitresearch.wordpress.com/links
A study in the dark arts of memory corruption. Provides a great series of tutorials on security topics. Hosts some top notch wargames that involve exploiting memory corruption vulnerabilities. These guys offer a “BugHunting” class regularly at conferences that is world class training for improving your 0day finding skills. Hosts free security class training material. Also includes excellent videos covering security topics. Good if you are starting from the ground up. Leave a Reply Cancel reply.
ashemery.com
Ali Hadi, Ph.D.
http://www.ashemery.com/misc.html
Ali Hadi, Ph.D. Education never ends, Watson. It is a series of lessons, with the greatest for the last. For his precious presentations about Information Security and Ethical Hacking I'm using. In my information security classes. For supporting the Infosec community consistently. For spreading the information security awareness in Arabic for our Arab Countries. For spreading the open source, and especially Linux spirit in Arabic for our Arab Countries.
hacktips.it
Siti e Risorse utili - HackTips
https://hacktips.it/link-utili
Sabato, marzo 11, 2017. Nozioni basilari di (in)sicurezza delle applicazioni Web Parte 2. Raccogliere informazioni tramite OSINT. Introduzione allo shell scripting. Sicurezza nei sistemi Unix. Quanto sono sicuri i siti dei comuni d’Italia? Scansione con nmap e analisi statistica degli stessi. Guide di Sicurezza Informatica e Hacking etico. Notizie di Sicurezza Informatica. Letture di sicurezza informatica consigliate. Siti e Risorse utili. Questa lista è in continuo aggiornamento! Sta diventando un pò.