There are many people with different backgrounds approaching the world of Information Security and trying to land a job in this field: software developers, sysadmins, network engineers, IT technicians, even people whose formal education and previous job don’t have anything to do with Infosec. Nowadays there aren’t strict requirements in terms of education for being an Information Security Professional, everyone …
Rock and Roll your Kali Linux 2016.1 – rolling ftw
You have been using Backtrack first and Kali Linux after, now reaching version 2 (codename “sana”) and you love it, don’t you? Yeah, everybody does. We’ve seen a huge increase in the adoption of this distro by security professionals, geeks and wannabies. The number of tools increased year by year and and so did its stability. Backtrack was Ubuntu based, …
Hardware assisted penetration testing
Penetration testing or pentesting is the practice of attacking your own or your clients’ IT systems in the same way a hacker would to identify security holes. Prior to start with the penetration testing you normally need to clearly define the scope and get a written consent from the client, in other words you need a pre-engagement contract signed by …