Information Security Playground

A collection of security related tips & tricks, articles, references, papers and tools.

A few words bout the blog...

Just a try to keep in one place anything interesting I come up to wile surfing the net. Occasionally I’ll try to post thoughts and expediencies regarding IT security, but that would be rare till I buy some free time… Cheers everyone, enjoy!

My other blogs...

  • blopaganda.blogspot.com
  • phileleftheros.blogspot.com

Blogs I read...

  • panathinaikosfan.blogspot.com
SYNC ME @ SYNC

Labels

  • analysis (3)
  • compromised (1)
  • cross-site scripting (1)
  • exploit (4)
  • file uploads (1)
  • forensic (1)
  • framework (1)
  • javascript injection (1)
  • lab (1)
  • linux (1)
  • malware (1)
  • metasploit (2)
  • penetration testing (3)
  • planning (1)
  • requirements and analysis (1)
  • rootkit (1)
  • scanning (3)
  • secure software (1)
  • security assessment (2)
  • server (1)
  • sql injection (4)
  • tool (1)
  • virtual machines (1)
  • virtualization (1)
  • Visualization (1)
  • vulnerability (3)
  • vulnerability scanning (1)
  • web (1)
  • web software security (2)

Monday, 5 November 2007

Tactical Exploitation - Black Hat USA 2007

SlideShare | View | Upload your own

Posted by V for Vlamenoi ;) at 5.11.07  

Labels: metasploit, penetration testing


AddThis Social Bookmark Button

0 comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

The authors...

  • Theo
  • V for Vlamenoi ;)

Label Cloud

Free Movies at Rapidshare

Blog Archive

  • ► 2008 (2)
    • ► April (2)
  • ▼ 2007 (11)
    • ▼ November (5)
      • What Every Engineer Needs to Know About Web Securi...
      • How to Break Web Software
      • Analysis of Compromised Linux Server
      • How not to get hacked!
      • Tactical Exploitation - Black Hat USA 2007
    • ► October (6)