Workshop series and Internship Opportunities
Hey !
Team NetNobles is the official representative of DEFCON in Bangalore, Mangalore and Chennai (formerly known as TopSecure in chennai). We conduct seminars and workshop on Cyber security and ethical hacking across various technical universities of India, and have got a very positive feedback from the student community.
We strive to give the best foundation to the students in Information security (by offensively securing themselves). We are open to calls from various colleges for workshops and seminars.
Our workshop series is named as “HaXor”. The participants of the workshop would get a certificate of attendance, a DVD toolkit and hands-on experience on offensive security. You can contact team netnobles at netnobles@gmail.com
Attendees of this program can apply for an internship opportunity with us. We shall short list based on the resume, and have a telephonic/online interview with the candidate and declare the results here.
Add yourself to our name list: Click here to add yourself to the program.
Download our brochure: NetNobles_EthicalHacking_Course_Brochure
Topics covered in the Level – 1 of the workshop series:
Internship opportunities with NetNobles Team:
Cheers
3psil0nlambda
BackTrack 5 tutorial: Part 3 – More on exploitation frameworks
Hey guys,
BackTrack 5, the much-awaited penetration testing framework, was released in May 2011. This third installment of our BackTrack 5 tutorial explores tools for browser exploitation such as theft of credentials, Web privilege escalation and password recovery. This part of our BackTrack 5 tutorial also provides an insight into automated SQL injection using DarkMySQLi.
Dig down to the bottom of the page to read the whole article unregistered on Techtarget on this link:
http://searchsecurity.techtarget.in/tip/BackTrack-5-tutorial-Part-3-More-on-exploitation-frameworks
Keep looking this blog for more on Backtrack5.
Cheers
3ps!L0nLaMbDa
BackTrack 5 Guide II: Exploitation tools and frameworks
Hi all,
In the first part of this BackTrack 5 guide, we looked at information gathering and vulnerability assessment tools. In the second part of this BackTrack 5 guide, we will use BackTrack 5 tools to exploit a remote system and learn how the exploitation framework can be used with the privilege escalation tool John the Ripper to crack passwords and gain access to a remote Windows system.
Dig down to the bottom of the page to read the whole article unregistered on Techtarget on this link:
http://searchsecurity.techtarget.in/tip/BackTrack-5-Guide-II-Exploitation-tools-and-frameworks
Keep looking this blog for more on BT5.
Cheers
3ps!L0nLaMbDa
BackTrack 5 tutorial Part I: Information gathering and VA tools
Greetings!
In this BackTrack 5 penetration testing tutorial, we will look at the information gathering and vulnerability assessment tools in BackTrack 5.
Dig down to the bottom of the page to read the whole article unregistered on Techtarget on this link:
Cheers
3ps!L0nLaMbDa
Advanced Wireshark tutorial: Packet and network security analysis
Hi all,
A follow up to my previous guide (Quick and dirty Wireshark tutorial), this advanced Wireshark tutorial will help you delve into Wireshark’s more advanced features. While the first section of this Wireshark tutorial explains how to analyze packets and get the time on a router whose IP address series is known, the second section deals with security analysis using Wireshark.
Dig down to the bottom of the page to read the whole article unregistered on Techtarget on this link:
Cheers
3ps!l0nLaMbDa
BackTrack-5 series to be posted soon @ 3psil0nlambda
Hi all,
BackTrack-5 series to be posted soon @ 3psil0nlambda in association with http://searchsecurity.techtarget.in. The project Revolution, the most awaited pen-testing framework has released on May 10th 2011, with a lot of promises. Famously knows as the back-track flavor of linux, this is a major development over the back-track4 R2. This new version supposedly, is built from scratch and has seen major improvements and bug fixes in the Back Track series of OS.
(Image courtesy, official backtrack website)
As we all know any penetration tester would ideally phase his attack in to five phases, namely:
- Information gathering
- Scanning and Vulnerability assesment
- Gaining access to the target
- Maintaining access with the target
- Clearing tracks
We shall see how back track 5 facilitates this approach in the pen testing scenario, in the BT5 series. The posts will be published on searchsecurity.techtarget.in and I shall update my posting here.
Until then cheers 😉
3psil0nlambda
A malware analysis kit for the novice
Malicious software – or malware, as it is more popularly known — has a long history, and continues to evolve in terms of sophistication and stealth. Over the past two decades, replication and spreading mechanisms used in malware have advanced considerably, as have techniques used to prevent analysis and detection. Such techniques include anti-debugging, encryption, packing and entry-point obscuring, among others. It is important to be aware or malware analysis procedures, using the available tools and a bit of ingenuity.
Dig down to the bottom of the page to read the whole article unregistered on Techtarget on this link:
http://searchsecurity.techtarget.in/tip/A-malware-analysis-kit-for-the-novice
Cheers
3ps!l0nLaMbDa
Social Engineer Toolkit (SET) tutorial for penetration testers
The social engineering toolkit v1.0 release, code-named Devolution, is a suite of custom tools solely focusing on attacking the human element of penetration testing. Social Engineer Toolkit (SET) uses Backtrack as the framework for penetration testing. SET has been written by David Kennedy, who is also known by the nickname ReL1K. Complete details on the Social Engineer Toolkit are available at http://www.social-engineer.org
In a pen-testing scenario, alongside uncovering vulnerabilities in the hardware and software systems and exploiting them, the most effective of all is penetrating the human mind to extract the desired information. Such devious techniques are known as social engineering, and computer-based software tools to facilitate this form the basis of the Social Engineer Toolkit.
This social engineering toolkit tutorial covers backdooring of executables, and also evading antivirus software, which is implicitly handled by a few scripts within this framework. This SET tutorial also touches upon a scenario in pen testing to ascertain whether employees of the organization are aware of the security threats they face via the art of social engineering.
Dig down to the bottom of the page to read the whole article unregistered on Techtarget on this link:
Cheers
3ps!l0nLaMbDa
Metasploit guide 4: Armitage cyber attack management GUI
In this Metasploit guide series, we have so far covered the basics of the Metasploit Framework (Msf); usage details of the meterpreter post-exploitation tool to create exploits that evade detection; as well as database configuration in Metasploit and post-exploitation phases.
This fourth and final installment of our Metasploit guide takes a look at Armitage, the cyber attack management tool for Metasploit. Armitage provides a GUI for the console-based framework that we covered in the previous three parts of this Metasploit guide. Let us explore exploiting of a vulnerable target using Armitage.
Dig down to the bottom of the page to read the whole article unregistered on Techtarget on this link:
http://searchsecurity.techtarget.in/tutorial/Metasploit-guide-4-Armitage-cyber-attack-management-GUI
Cheers
3ps!l0nLaMbDa


