Secure coding February 12, 2016 Rorot Java Security Guide Java as a framework comes with certain inherent features that ensure the safety of deployed applications. However vulnerabilities in web applications still...
Secure coding January 20, 2016 Prateek Gianchandani Developing Secure Java Code – Best Practices for a Team The following whitepaper shall introduce to us the basic practices to be followed to write secure Java code. The following topics are touched on- general...
Hacking December 29, 2015 Irfan Shakeel The Art of Network Vulnerability Assessment This ebook discusses the concept, setup and implementation of a successful vulnerability assessment on any network using Nessus. You will get a chance to learn...
Secure coding December 7, 2015 Irfan Shakeel Top .NET Secure Coding Practices for a Team Developing a software and web application is not a one man (developer) job; there is a team behind the success and failure of any product (software/application). This...
Secure coding December 1, 2015 Prateek Gianchandani Top PHP Secure Coding Practices for a Team This whitepaper will discuss basic PHP secure coding practices that should be followed when working in a team environment. In this paper you will learn how...
IT certifications November 23, 2015 Infosec CISSP Domain #1 Cheat Sheet: Security and Risk Management Our new Cheat Sheet on the first domain of the CISSP, "Security and Risk Management," covers all the major focus areas you need to know for the exam! Our...
Hacking November 18, 2015 Tri Sumarno Advanced Pentesting Techniques with Metasploit In this mini-course, you will learn about some of the advanced penetration testing techniques used with Metasploit. It is expected that the reader has a basic...
Hacking November 11, 2015 Jatin Jain Network Fingerprinting and Exploitation In this mini-course you will learn some intermediate and advance techniques of network pentesting information gathering, as well as some new scanning techniques....
Hacking November 4, 2015 Srinivas Privilege Escalation without Automated Tools This book acts as an introduction to those who know how to use Metasploit and do not know what happens behind the screens. If you can’t judge your knowledge...
Hacking October 2, 2015 Jatin Jain Browser Attack Tutorial 38 Page eBook In this mini-course, you will get to know different types of web browsers; what each web browser does; how you can identify remote host browser...