Nmap – Techniques for Avoiding Firewalls « Penetration Testing Lab http://pentestlab.wordpress.com/2012/04/02/nmap-techniques-for-avoiding-firewalls/
Nmap – Techniques for Avoiding Firewalls « Penetration Testing Lab http://pentestlab.wordpress.com/2012/04/02/nmap-techniques-for-avoiding-firewalls/
U3-Pwn v1.0 Released http://www.toolswatch.org/2012/07/u3-pwn-v1-0-released/
Report: BYOD, Virtualization, Mobile Will Make 45% of Networks Obsolete by 2016 http://www.networkcomputing.com/data-networking-management/240003013
Improved artifact scanner from Malware Analysis Cookbook http://www.attackdefendsecure.com/2012/07/improved-artifact-scanner-malware-analysis-cookbook/
U3-Pwn v1.0 Released http://www.toolswatch.org/2012/07/u3-pwn-v1-0-released/
Review – The Art of Human Hacking http://www.toolswatch.org/2012/07/review-the-art-of-human-hacking/
América Latina bajo ciberataques durante la primera mitad del 2012 http://www.cwv.com.ve/?p=10716
Improved artifact scanner from Malware Analysis Cookbook http://www.attackdefendsecure.com/2012/07/improved-artifact-scanner-malware-analysis-cookbook/
An Overview Of Protocol Reverse-Engineering http://computer-forensics.sans.org/blog/2012/07/03/an-overview-of-protocol-reverse-engineering