Penetration testing course: 0x02.4.1 What is the best programming language for hacking?

There isn’t a go-to programming language that is considered the best to use, so I’m not going to simply tell you one name, there’s no such secret recipe for developing security tools. It is much wiser instead to make a comparison between the most used programming languages and be ready to some flexibility. Technologies change and so we need to adapt; besides as you learn new things, you have a wider choice than you had before. Don’t be static, allow some dynamism, be willing to learn and improve your skills each and every time you get a chance to do it.

Penetration testing course: 0x02.4 Is programming important for hacking?

Long story short: yes, programming is important for being a good hacker or security professional. I’m sure you already wondered about the importance of programming if you are a beginner and if you are a professional you’ll often  shrug your shoulders when you see this question a lot or hear the answers. It’s a question that has been asked a …

OWASP AppSec Europe 2016 : a roundup

This year’s AppSec Europe was hosted in Rome, Italy and I decided to participate as a volunteer in order to help the OWASP organization and meet up with my friends of the Italian OWASP chapter. It was my first time at AppSec Europe and it was truly amazing. The event started with some hands on trainings running on 27th-28th-29th June …

Infosecurity Europe 2016 is approaching : what to see

WHAT Although Infosecurity Europe isn’t one of the events with the best technical talks, it is Europe’s largest information security event comprising vendors exhibitions and experts’ presentations. WHERE Infosecurity Europe will be held at Olympia London,Hammersmith Rd, London ,W14 8UX. If you are using public transports the nearest tube station is Kensington Olympia and if you prefer taking a bus the …

Penetration testing course: 0x02.3.2 Network software – OSI and TCP/IP reference models

The first computer networks were designed with the hardware as the main concern and the software as an afterthought. This strategy no longer works. Network software is now highly structured. In the following sections we examine the software structuring technique in some detail. Protocol Hierarchies To reduce their design complexity, most networks are organized as a stack of layers or …

Penetration testing course: 0x02.3.1 Network hardware

Broadly speaking, there are two types of transmission technology that are in widespread use: broadcast links and point-to-point links. Point-to-point links connect individual pairs of machines. To go from the source to the destination on a network made up of point-to-point links, short messages, called packets in certain contexts, may have to first visit one or more intermediate machines. Often …

Cracking the infosec interview for fun and profit – how not to suck and get $$ hired $$

There are many people with different backgrounds approaching the world of Information Security and trying to land a job in this field:  software developers, sysadmins, network engineers, IT technicians, even people whose formal education and previous job don’t have anything to do with Infosec. Nowadays there aren’t strict requirements in terms of education for being an Information Security Professional, everyone …