Hacking for Dummies by Kevin Beaver is an information security professional’s introduction to ethical hacking. It is 22...
Archive for category: Book Reviews
Book Review: Malware Data Science
MTGreen, , , Book Reviews, book review, data science, highlight, machine learning, malware, neural networks, reverse engineering, 1Neural Network Learning Malware vs Benignware “Malware Data Science: Attack Detection and Attribution” (MDS) is a book every information...
Book Review: Social Engineering: The Science of Human Hacking
BillV, , , Book Reviews, book review, career, defcon, derbycon, hadnagy, se, social engineering, 3In his new book, “Social Engineering: The Science of Human Hacking, 2nd Edition,” Chris Hadnagy really hits the mark...
Book Review: Investigating Cryptocurrencies
Phillip Aaron, , , Book Reviews, bitcoin, blockchain, book review, cryptocurrency, cryptography, currency, ether, forensics, 0As the saying goes, “Follow the money.” Regardless of one’s philosophical argument on the merits of a decentralized currency...
Book Review: Cracking Codes with Python
Ray Doyle, , , Book Reviews, book review, cipher, cryptography, programming, python, 2With one last code modification, you’re in, and the contents of the vault are yours! Cracking Codes with Python...
Book Review: Black Hat Python
Don Donzal, , , Book Reviews, book review, forensics, highlight, linn, pentest, programming, python, 3Earlier this year, I wrote of my long love affair with Ruby coming to an end and my desire...
Book Review: Hacking and Penetration Testing with Low Power Devices
hayabusa, , , Book Reviews, Features, book review, hacking, hardware, iot, pentest, 1Hacking and Penetration Testing with Low Power Devices” by Philip Polstra is an excellent read. The author bases this...
Book Review: Python Forensics
Don Donzal, , , Book Reviews, book review, forensics, network forensics, programming, python, 0After a long love affair with Ruby, I was excited to get back into more Python in the new...
Book Review: Penetration Testing: A Hands-On Introduction to Hacking
hayabusa, , , Book Reviews, book review, exploit dev, kali, metasploit, mobile, pentest, wireless, 0“Georgia, Georgia…” The tune “Georgia on My Mind” was spinning through my head when I was given the chance...
Book Review: Applied Network Security Monitoring
hayabusa, , , Book Reviews, book review, network, nsm, security, 1As books go, I'm a lifelong reader, so when offered the chance to do more 'regular' reviews for The...
Upcoming Webinars
– EH-Net Live! Feb – “From Dev to InfoSec: #MyInfoSecStory“ with Rey Bango of Microsoft on Feb 21 @ 1:00 PM EST. Reg Open Now!
Past Webinars
– EH-Net Live! Jan – Video & Deck Available Soon! for “A Perfect Crime: The Tech and Psych of Effective Phishing” with Erich Kron of KnowBe4 from Jan 31.
– EH-Net Live! Dec – Video & Deck Now Available! for “Learning AI for Hackers- A Visual Primer” by Joshua Saxe of Sophos from Dec 20.
– EH-Net Live! Nov – Video & Deck Now Available! for “The Bots Are Coming! A Blue Team Survival Guide” by Peter Schawacker of Deloitte from Nov 29.
– EH-Net Live! Oct – Video & Deck Now Available! for “Blockchain Hacking for Investigating Cryptocurrencies” with Nick Furneaux from Oct 24.
See all EH-Net Live! Videos
EH-Net YouTube Channel
More on the EH-Net YouTube Channel
Upcoming Events
-
Nullcon Goa 2019
March 1 - March 2 -
RSA Conference 2019
March 4 - March 8 -
Black Hat Asia 2019
March 26 - March 29 -
InfoSec World 2019
April 1 - April 3 -
ForenSecure19
April 11 - April 12 -
THOTCON 0xA
May 3 - May 4
Recent Articles
-
Video: A Perfect Crime: The Tech and Psych of Effective Phishing February 8, 2019
-
Webinar: From Dev to InfoSec: #MyInfoSecStory on Feb 21, 2019 February 5, 2019
-
Ease Me Into Cryptography Part 3: Asymmetric Ciphers January 31, 2019
-
How to Get the Best ROI in Test Automation January 30, 2019
-
The Evaluation: Stage 3 – Execution of Testing January 28, 2019
-
Hardware Hacking 101 – Lesson 1: Beauty, Your Home Lab and Basic Electronics January 23, 2019
-
Webinar: A Perfect Crime: The Tech and Psych of Effective Phishing on Jan 31, 2019 January 17, 2019
-
Cyber Security FUD – Fear and the Growth of the InfoSec Industry January 10, 2019
Tags
Featured Community Articles
-
How to Get the Best ROI in Test Automation January 30, 2019
Testing automation came into existence as we all need to do more testing in the fastest manner, but to derive the best ROI for testing automation, it becomes quite blurry. You may have to be just if able while implementing testing automation all over your organization. Moreover, in the era of Agil...
-
DoD RMF Part 1: How We Got to the RMF October 1, 2018
Over the next few weeks, I plan to post about the RMF process. This will piggy back on and expand upon the article: My Experience with the DoD Version of the RMF. A little background on how the DoD got to the RMF. For those that have been around a while, it started with the Rainbow series of pub...
-
My Experience with the DoD Version of the RMF September 21, 2018
Anyone out there dealing with the DoD implementation of the NIST 800-37 RMF? Just in case, it’s the “Guide for Applying the Risk Management Framework to Federal Information Systems” developed by the Joint Task Force Transformation Initiative Working Group. I have been knee deep in ...
-
Windows Privilege Escalation – Unquoted Services April 23, 2018
So, you’ve popped a user shell on a windows box and now you’re looking to escalate those privileges. Great! In this article we’ll look at one method of elevating your privileges by exploiting unquoted system services. A Windows service is a program that runs in the background simil...
-
Hello World! – Get Published in the EH-Net Community March 1, 2018
Can I really get published on EH-Net? Welcome to The Ethical Hacker Network and our extended family, the EH-Net Community Members. Although EH-Net is an online magazine with all of our content free and freely available, being an EH-Netter has it’s rewards. In addition to many social features l...
See All Community Articles
EH-Net Community Members
-
active 18 minutes ago
-
active 21 minutes ago
-
active 4 hours, 22 minutes ago
-
active 4 hours, 55 minutes ago
-
active 6 hours, 18 minutes ago
-
active 8 hours, 39 minutes ago
-
active 8 hours, 49 minutes ago
-
active 10 hours, 10 minutes ago
-
active 10 hours, 34 minutes ago
-
active 11 hours, 51 minutes ago
EH-Net Community Groups
-
148 members
-
143 members
-
109 members
-
89 members
-
76 members
Recent Forum Topics
-
Video: A Perfect Crime: The Tech and Psych of Effective Phishing
by
Don Donzal
1 week, 1 day ago -
Webinar: From Dev to InfoSec: #MyInfoSecStory on Feb 21, 2019
by
Don Donzal
1 day, 15 hours ago -
Ease Me Into Cryptography Part 3: Asymmetric Ciphers
by
Ellie Daw
2 weeks, 2 days ago -
How to Get the Best ROI in Test Automation
by
manchun
2 weeks, 3 days ago -
The Evaluation: Stage 3 – Execution of Testing
by
Rafal Los
2 weeks, 5 days ago -
I have been hacked and cant find the door
by
LT72884
2 weeks, 3 days ago -
Hardware Hacking 101 – Lesson 1: Beauty, Your Home Lab and Basic Electronics
by
Ian Sindermann
3 weeks, 3 days ago -
Webinar: A Perfect Crime: The Tech and Psych of Effective Phishing on Jan 31, 2019
by
Don Donzal
2 weeks, 2 days ago -
Cyber Security FUD – Fear and the Growth of the InfoSec Industry
by
Cathy Ullman
1 month ago -
Video: Learning AI for Hackers – A Visual Primer
by
Don Donzal
1 month, 1 week ago
Recent Forum Replies
-
Elizabeth Powlett on Webinar: From Dev to InfoSec: #MyInfoSecStory on Feb 21, 2019
1 day, 15 hours ago -
Don Donzal on Webinar: A Perfect Crime: The Tech and Psych of Effective Phishing on Jan 31, 2019
2 weeks, 2 days ago -
wouter-van-der-wal on Webinar: A Perfect Crime: The Tech and Psych of Effective Phishing on Jan 31, 2019
2 weeks, 2 days ago -
LT72884 on I have been hacked and cant find the door
2 weeks, 3 days ago -
Don Donzal on I have been hacked and cant find the door
2 weeks, 5 days ago -
aditya on Java programming
4 weeks ago -
octavioshaffer on PacketProtector- IPS and web AV in a wireless router
1 month ago -
Michael J. Conway on Cyber Security FUD – Fear and the Growth of the InfoSec Industry
1 month ago -
Tim on IoT Security 101 (Resource git repo)
1 month ago -
Michael J. Conway on The L0pht Legacy
1 month, 1 week ago