Forum Replies Created
-
AuthorPosts
-
-
December 31, 2013 at 4:36 am #53360
hanyhasan
ParticipantHi , the prices listed now on the website
http://www.offensive-security.com/information-security-training/penetration-testing-with-kali-linux/ -
August 27, 2013 at 12:03 pm #53434
hanyhasan
ParticipantWeb Application Pentesting on 15th September 2013 ;D can’t wait
-
August 24, 2013 at 12:55 pm #53395
hanyhasan
ParticipantHi , early this year i took a class with him ” 2 days ” first day was Network Pentest and 2nd day was web-app pentest , currently am taking with him Cyberwar2014 “Beta” .And ill take the 200 $ package next month from Stratgeic Sec Pentest lab . He is so Pro in his information his class is live using citrix web2go and giving all the metrials ( pdf , vid , vm , …etc ) he start explain and testing and hacking live in his Lab then give us access to his online lab thru VPN connection for 30 days . Webapp , IDS , IPS ,WAF , loadbalancer evasion techniques with proxy chain ,ssl scripts he explain it as ICDL things i mean make it look’s easy .. By the way his never use backtrack or kali , he is doing all this by using ubuntu 12.04 with all the tools used for the lab , and he is giving the link to download this vm as wel … watch some of this videos before registering . I know my English is :- …
-
July 25, 2013 at 7:56 am #53267
hanyhasan
ParticipantThanks Superkojiman , also he can check presentation from Joe Mccray it was a webinar but i don’t found the video .
-
July 9, 2013 at 8:17 am #53237
hanyhasan
Participant@unicap2700 wrote:
I’m doing this for home users in their homes. I need to use CDs on-site. How do I get them legally, rebuild the system with them, and add the customer’s existing keys.
How do i get them legally ? It depends on the customer if they need a copy or original . Then using any imagining software ( Norton Ghost , Acronis .. ) but look this will be for one machine due security signature or security id per copy i don’t remember .
-
July 9, 2013 at 6:47 am #53235
hanyhasan
ParticipantHi
look in our government sector we have an account with Microsoft with all ISOand we have KMS server ” Key Management Service (KMS) This approach establishes a local activation service hosted in your own environment. To do this, you must configure a system on your network to serve as the KMS host by installing and activating a KMS host key. Client systems throughout your organization then connect to the local Office 2010 KMS host for activation ” …
So after installing any windows or office we join the Pc to the domain and issuing this commands
C:Usersusername>slmgr -skms companynamedhcp
C:Usersusername>slmgr -ato
So if the user resigned and took the laptop or he lost it, i mean if he stay away for like 30 days not joining the Domain his windows and office will ask for activation -
June 29, 2013 at 8:33 am #53192
hanyhasan
ParticipantHi
check this write up about worldmail 3.0
http://www.bnxnet.com/2012/10/01/seh-worldmail-example/ -
June 19, 2013 at 6:01 am #53046
hanyhasan
Participant@batz21 wrote:
Enumeration is the Key it seems can you guys share any useful link or point me to a Book
Which Enumeration Tools should master , Right now I am relyin heavily on namp,netcat,rpclient đ
regards
Hi Batz21 .
Going through those books fast and use the Enumeration tools which they mention
1.Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
2.Backtrack 5 cookbook
3.BackTrack 4: Assuring Security by Penetration Testing..Old but believe me has many many tools and how to use them .. try the tools in the lab and compare the results a tool like fierce for DNS enumeration is better than both Dig and Host !!
4.Nmap Cookbook: The Fat-free Guide to Network Scanning
5.The Basics of Hacking and Penetration Testing
Currently am preparing also for OSCP by taking some crash course on PT from Joe Maccry weekend boot cam and its by 100$ only and have like 30 days on the lab next weekend he have Exploit Dev again 2 days by 100$ only . Have a look to this video about Exp_Dev
http://www.youtube.com/watch?v=eNSWUAVxbzk
from BSides Rhode Island Con was on 15-6-2013.
All the best and keep update us -
June 13, 2013 at 8:07 am #53008
hanyhasan
ParticipantGentle Reminder ;D
Still asking for username & password -
June 12, 2013 at 8:51 am #53076
hanyhasan
ParticipantFinally Congrats Man . In 12 Hours nice
-
May 30, 2013 at 5:10 am #53038
hanyhasan
Participant@superkojiman
I think this is your blog ” http://www.iodigitalsec.com/blog/ “.
also plz update your signature đ you are OSCE now@batz21
have a look at his blog and read his review about OSCP . He signed for 60 days but end up using only 36 and finish the final challenge in 8 hours 8) -
May 29, 2013 at 9:02 am #53034
hanyhasan
ParticipantHi batz21 , ok am not senior member yet , but am also planning to take the OSCP before Dec2013 . I read many many reviews from here EH and google search . I found that the key to this certificate by mastering this topics .
Bashing skills = to automate tasks = reduce time .
Enumeration , Enumeration ===Â found it in many reviews
Scanning = nmap & unicornscan ,make it a habit to scan the 65535 ports
Privilege escalation =Â g0tma1k have a nice article about it and every one recommend it
Exploitation = corlan.de = Python + C .. usually modifying the code of the exploitÂ
Finally writing the Report .. keep it ready from now , make a template. -
May 28, 2013 at 5:29 am #53032
hanyhasan
ParticipantHi Matt
Tracing who is doing this will not solve the problem this website is it personal or belong to the Ministry .In both cases change the hosting company if you host your site on unknown one I mean go for famous once âGodady.. hostgatoe . Are you web developer? Are using CMS â joomla , wordpress , ..etcâ ?
My advice to you just give this work to any web developing company , shop whatever and they give you access only to update the content of the website
Regard your 2 PC just format them . -
May 22, 2013 at 6:33 am #52971
hanyhasan
ParticipantHi , take some time and watch this webinar from elearnsecurity by Armando .
http://www.elearnsecurity.com/collateral/webinar/pentesting_beginners/
..
It will answer all your question in you head, its almost 1 hour . i download it convert it to mp3 so i listen it like 3 or 4 times then i decide what i want be in ” info sec” . -
May 22, 2013 at 6:16 am #52865
hanyhasan
ParticipantHi , have a look at Gray Hat Python book released on 2009 , this is a review from Ryan Lin
http://www.ethicalhacker.net/content/view/262/2/
also i found a videos series based on this book on youtube , this is the channel http://www.youtube.com/user/jstrosch. They are 4 parts
-
-
AuthorPosts