Categories: security, hacking lab, spying, tool

Belgian Testing Days 2013 - Tool selection: a successful approach by Bernd Beersma

by admin Email

      Introduction This is an article in two parts; first I will do a recap of Bernd Beersma?s talk about tool selection during the Belgian Testing Days. As an add on I will show how this process can be adapted to select open source tools as often u… more »

SANS evening session: "Patching your employee's brain" (by Pieter Danhieux)

by admin Email

SANS evening session: "Patching your employee's brain" (by Pieter Danhieux)   Introduction I wanted to see both talks during this SANS community night (http://blog.nviso.be/2013/02/sans-belgium-community-night.html) but due to traffic I missed half o… more »

Update on URL Crazy

by admin Email

My article on URL Crazy and email spying was updated with a little more content and published in Auditing and Standards Magazine. The magazine is not for free but should you want a reduction in the subscription cost, send me a message ... more »

On web surfing and privacy

by admin Email

Why your security should be like Shrek

by admin Email

What is the relation between security and Shrek? Shrek is an Ogre, Ogres are like onions, onions have layers thus Shrek has layers. Security should also have layers and thus security should be like Shrek (in the sense that it has layers and not that it… more »

How to set up a software hacking lab - PDF download

by admin Email

I have had many nice comments on the article series on how to set up a software hacking lab. By popular demand I have grouped the articles in a document (.pdf). You can download the the document here.   I have made some small changes to the text and… more »

How to set up a software hacking lab - part 3 - networking

by admin Email

This is the final article in the series on how to set up a software hacking lab.   Setting up internal networking in virtual box Now that we have a number of virtual machines installed we need to set up our environment. Some distributions set their… more »

How to set up a software hacking lab - part 2 - attack tools

by admin Email

Prerequisites This is the third installment and we are nearing the finish line, actually we are halfway. The next article will explain you how to actually use your hacking lab and I guess that is the article everyone is waiting for.   Attack tool se… more »

How to set up a software hacking lab - part 1 - targets

by admin Email

Prerequisites OK, last installment we set up our hosting environment. For the sake of keeping this article simple I will presume you are using virtualbox to run virtual machines, any other visualization software should work but the options might be cal… more »

How to set up a software hacking lab - part 0

by admin Email

This is the first in a series of articles on how to set up a software hacking lab. In this first article I will detail the goals and means to reach top goals. The hacking lab we are setting up is all about software, it does not lend itself for hardware… more »

1 2 >>