Posted by Avi Weissman on Jul 7, 2013 in How To, Position Articles | 0 comments
This article, for a change, is not intended for hackers but rather to the CISOs amongst you. As a Chief Information Security Officer you have to endure a longer fight and a very complex array of systems in your organization regardless of the ’8th layer of the OSI model’ – the human layer. This article is intended to provide some advices on some topics you should consider prior to...
read more
Posted by Avi Weissman on Jun 13, 2013 in Events, Main Menu | 0 comments
Congratulations to Hacking Defined Experts Class 40! After months of hard work you have earned becoming a part of a great tradition and joining the list of Hacking Defined Experts...
read more
Posted by Avi Weissman on Jun 8, 2013 in Main Menu | 0 comments
HDE 41 class has started. We wish our students good luck at their new journey. Image by Matan Golan Photography & Graphics. To see more [Facebook Page] and her [Web Page].
read more
Posted by Avi Weissman on May 14, 2013 in How To, Main Menu, Position Articles | 0 comments
Introduction This article is intended to the PenTest Vendor as well as the PenTest receiver. The idea is to provide the reader with tips to follow in order to make sure that while you are conducting the pentest you do not harm the systems or their availability. These tips refer mostly to infrastructure or Web Application testing and not to protocol, application or other types of security tests....
read more
Posted by Avi Weissman on Apr 16, 2013 in Code | 0 comments
After I took control of a Linux machine, we want to do a privilege escalation, and get a root. So i started thinking how i gonna do it and i found a way to get the root password by faking the sudo command. If i would fake the sudo command, and abuse it when the user would want to execute some application as sudo, it will ask him for a root password,then the root password will send to the...
read more