nhtc.blogspot.com
Security|Networking|Hacking|Life. by 6e:69:63:6b:38:63:68: Defcon 17 - Boing!!!
http://nhtc.blogspot.com/2009/07/defcon-17-boing.html
Jul 2, 2009. Defcon 17 - Boing! Well its that time again. Vegas will once again be swamped with the likes of white, gray and black hats from all creeds, colors, income tax brackets and species. What an experience! If you have a chance to attend I HIGHLY recommend it. More info can be found here. http:/ defcon.org. Be sure to check the DEFCON forums for info on attending. I personally liked checking out some of the you-tube vids from previous years to get a feel for what to expect. You're in the friggin d...
nhtc.blogspot.com
Security|Networking|Hacking|Life. by 6e:69:63:6b:38:63:68: Social-engineer.org
http://nhtc.blogspot.com/2009/12/social-engineerorg.html
Dec 15, 2009. First of. Whoa first post since July! Busy Busy. Nice new adventures in Pen testing to write about in coming months though. I wanted to post a quick review of a site that ALL security professionals and penetration testers alike should be frequenting. By far the best if not the only source of all things social engineering. Move over Mitnik! They are presently on their 3rd month of podcasts, all can say is its pure gold! DerbyCon - Louisville, KY. Remote Exploit - The Creators of Back Track.
nhtc.blogspot.com
Security|Networking|Hacking|Life. by 6e:69:63:6b:38:63:68: November 2012
http://nhtc.blogspot.com/2012_11_01_archive.html
Nov 13, 2012. Changes to NHT Consulting. Effective November 1st 2012 NHT Consulting is no longer accepting clients. Existing NHT clients will be transitioned to a sister company and still will be handled with the quality and professionalism they have had in the past. The reason for this is that I have accepted a full time postion with TrustedSec as a Senior Security Consultant. Here is a little background on TrustedSec:. 8221; and “ Artillery. For more information check out http:/ trustedsec.com.
nhtc.blogspot.com
Security|Networking|Hacking|Life. by 6e:69:63:6b:38:63:68: Social Engineering: The Art of Human Hacking - Essential Read for any Security Professional
http://nhtc.blogspot.com/2011/01/social-engineering-art-of-human-hacking.html
Jan 9, 2011. Social Engineering: The Art of Human Hacking - Essential Read for any Security Professional. Chris Hadnagy of Social-Engineer.org has done a tremendous job on a ground breaking new SE book. I appreciated how this book is not a "how-to" for would-be malicious hackers or con men. But a guide on the what, how and why techniques behind Social Engineering can be used for malicious purposes. In fact, Chapter 9 is dedicated to "Prevention and Mitigation" of SE attacks. DerbyCon - Louisville, KY.
nhtc.blogspot.com
Security|Networking|Hacking|Life. by 6e:69:63:6b:38:63:68: January 2011
http://nhtc.blogspot.com/2011_01_01_archive.html
Jan 9, 2011. Social Engineering: The Art of Human Hacking - Essential Read for any Security Professional. Chris Hadnagy of Social-Engineer.org has done a tremendous job on a ground breaking new SE book. I appreciated how this book is not a "how-to" for would-be malicious hackers or con men. But a guide on the what, how and why techniques behind Social Engineering can be used for malicious purposes. In fact, Chapter 9 is dedicated to "Prevention and Mitigation" of SE attacks. Subscribe to: Posts (Atom).
nhtc.blogspot.com
Security|Networking|Hacking|Life. by 6e:69:63:6b:38:63:68: Internal Net Policies. Part 1
http://nhtc.blogspot.com/2008/12/internal-net-policies-part-1.html
Dec 26, 2008. Internal Net Policies. Part 1. I thought a good start to the "re-invigoration" of this blog would be to post a couple articles that have been written for other publication. Enjoy. Part 1: File Sharing. Does your company have an internal network policy? What exactly is the risk? Many file sharing programs are just that, the y. 8220;share” files. How so? In many popular easy -. Use file sharing applications ,. When this file-sharing program shares those files ,. It shares the entire. Very use...
nhtc.blogspot.com
Security|Networking|Hacking|Life. by 6e:69:63:6b:38:63:68: March 2012
http://nhtc.blogspot.com/2012_03_01_archive.html
Mar 29, 2012. RAM Forensic Analysis - Useful in Penetration Testing? Going into the course, honestly I was thinking it would be a blast and the info would really get my hacker juices flowing, but in a practical way, based on my current job, would I be able to apply it? Being a pen-tester by trade and digital forensics being a small part of what I do, I was skeptical, although very excited to attend. Could I use this in pen-testing? After the first day I knew the answer. YES! But what about RAM? Can you g...
nhtc.blogspot.com
Security|Networking|Hacking|Life. by 6e:69:63:6b:38:63:68: December 2009
http://nhtc.blogspot.com/2009_12_01_archive.html
Dec 15, 2009. First of. Whoa first post since July! Busy Busy. Nice new adventures in Pen testing to write about in coming months though. I wanted to post a quick review of a site that ALL security professionals and penetration testers alike should be frequenting. By far the best if not the only source of all things social engineering. Move over Mitnik! They are presently on their 3rd month of podcasts, all can say is its pure gold! Subscribe to: Posts (Atom). DerbyCon - Louisville, KY.
nhtc.blogspot.com
Security|Networking|Hacking|Life. by 6e:69:63:6b:38:63:68: March 2009
http://nhtc.blogspot.com/2009_03_01_archive.html
Mar 17, 2009. Security Certification Exam Cage Match. What is the best group of letters to have after your name as a security professional? I thought I would write a brief account of my experience with three of such certifications. Certified Ethical Hacker (CEH), GIAC Certified Penetration Tester (GPEN) and Offensive Security Certified Professional (OSCP). Good, moving on to our next tool.” Was this a Ethical Hacking course or a discussion of man pages? 8221;, does that make me a security professional?