vnascimento

Article: Protecting a Laptop from Simple and Sophisticated Attacks

Protecting a Laptop from Simple and Sophisticated Attacks https://grepular.com/Protecting_a_Laptop_from_Simple_and_Sophisticated_Attacks

Article: BeEF – The Browser Exploitation Framework Blog: BeEF In a Real World Pen Test – Part 2: Tasty BeEF nuggets, line, hook and sinker (Social Engineering to get a hook)

BeEF – The Browser Exploitation Framework Blog: BeEF In a Real World Pen Test – Part 2: Tasty BeEF nuggets, line, hook and sinker (Social Engineering to get a hook) http://blog.beefproject.com/2012/05/beef-in-real-world-pen-test-part-2.html

Article: Top 10 Most Searched Metasploit Exploit and Auxiliary Modules

Top 10 Most Searched Metasploit Exploit and Auxiliary Modules http://www.toolswatch.org/2012/05/top-10-most-searched-metasploit-exploit-and-auxiliary-modules/

Article: Anatomy of a security hole – the break that broke sudo

Anatomy of a security hole – the break that broke sudo http://nakedsecurity.sophos.com/2012/05/21/anatomy-of-a-security-hole-the-break-that-broke-sudo/

Article: PHP 5.4 Remote Exploit PoC in the wild

PHP 5.4 Remote Exploit PoC in the wild http://isc.sans.edu/diary.html?rss&storyid=13255

Article: Cyber Risk Report

Cyber Risk Report http://www.cisco.com/web/about/security/intelligence/CRR_May7-13.html

Article: Understanding SQL Injection

Understanding SQL Injection http://www.cisco.com/web/about/security/intelligence/sql_injection.html

Article: Database Encryption for Application Development

Database Encryption for Application Development http://www.cisco.com/web/about/security/intelligence/db-encryption.html

Article: 10 Steps to Better Security Incident Detection

10 Steps to Better Security Incident Detection http://www.tripwire.com/en/emea/register/10-steps-to-better-security-incident-detection/

Article: Tools->Information Gathering

Tools->Information Gathering http://isc.sans.edu/diary.html?rss&storyid=13246