Yearly Archives: 2012

Nmap – Techniques for Avoiding Firewalls « Penetration Testing Lab

Nmap – Techniques for Avoiding Firewalls « Penetration Testing Lab http://pentestlab.wordpress.com/2012/04/02/nmap-techniques-for-avoiding-firewalls/

U3-Pwn v1.0 Released

U3-Pwn v1.0 Released http://www.toolswatch.org/2012/07/u3-pwn-v1-0-released/

Report: BYOD, Virtualization, Mobile Will Make 45% of Networks Obsolete by 2016

Report: BYOD, Virtualization, Mobile Will Make 45% of Networks Obsolete by 2016 http://www.networkcomputing.com/data-networking-management/240003013

Improved artifact scanner from Malware Analysis Cookbook

Improved artifact scanner from Malware Analysis Cookbook http://www.attackdefendsecure.com/2012/07/improved-artifact-scanner-malware-analysis-cookbook/

Testing Lab

Penetration Testing Lab http://pentestlab.wordpress.com/

U3-Pwn v1.0 Released

U3-Pwn v1.0 Released http://www.toolswatch.org/2012/07/u3-pwn-v1-0-released/

– The Art of Human Hacking

Review – The Art of Human Hacking http://www.toolswatch.org/2012/07/review-the-art-of-human-hacking/

América Latina bajo ciberataques durante la primera mitad del 2012

América Latina bajo ciberataques durante la primera mitad del 2012 http://www.cwv.com.ve/?p=10716

Improved artifact scanner from Malware Analysis Cookbook

Improved artifact scanner from Malware Analysis Cookbook http://www.attackdefendsecure.com/2012/07/improved-artifact-scanner-malware-analysis-cookbook/

An Overview Of Protocol Reverse-Engineering

An Overview Of Protocol Reverse-Engineering http://computer-forensics.sans.org/blog/2012/07/03/an-overview-of-protocol-reverse-engineering