Jump to content


  • Content Count

  • Joined

  • Last visited

Community Reputation

108 Excellent

About banana88

  • Rank
  • Birthday 09/09/1975

Profile Information

  • Gender
  • Location
  • Interests
    IT-Security, BackTrack, Social Engineering, Penetration-Tester, Computer Forensics

Recent Profile Visitors

151 profile views
  1. secnoob said it has Corelan Bootcamp training. [Hidden Content] I asked him It has Course contents is that? The x86 environment System Architecture Windows Memory Management Registers Introduction to Assembly The stack The exploit development lab environment Setting up the exploit developer lab Using debuggers and debugger plugins to gather primitives Stack Buffer Overflows Stack Buffers Functions Saved return pointer overwrites Stack cookies Structured Exception Handlers Function pointers Data/object pointers vtable/virtual functions Off-by-one Integer overflows Size limitations Limited buffers, shellcode splitting Reliability++ & Reusability++ Finding and avoiding bad characters Creative ways to deal with character set limitations Metasploit framework Exploit Modules Writing exploits for the Metasploit Framework Porting exploits to the Metasploit Framework ASLR Bypassing ASLR DEP Bypassing NX/DEP Return Oriented Programming / Code Reuse (ROP) Heap Spraying Heap Management and behaviour Heap Spraying for Internet Explorer 6 and 7 Heap Feng Shui & heaplib Precise Heap Spraying in modern browsers IE8, IE9, IE10, Firefox Browser Exploitation Exploiting Browser Use-After-Free conditions He said yes I asked him is not a fake copy with information on page corelan or information on the net. secnoob response is original corelan training. is a fake copy handwriting does not match any size (writing and color). I can post this to admin to see cheap fake copy. I know how it looks Corelan Bootcamp training. from fake copy for example: module Heap Spraying is from internet (Feng Shui with Internet Explorer 6,7 ) Corelan not used Heap Spray from Feng Shui on training. what cheap copy :biggrin: Corelan not using ideas from someone else on training, he uses his ideas. And then closed the discussion with him
  2. torrent [hide][Hidden Content]] magnet magnet:?xt=urn:btih:d0e24e80e71a411a60817d6cf07f5d953cc2edb1&dn=CentOS%207%20Linux%20Server%20-%20Alternative%20to%20Red%20Hat%20Enterprise&tr=udp%3A%2F%2Ftracker.openbittorrent.com&tr=udp%3A%2F%2Ftracker.publicbt.com
  3. AWAE is very good is better as elearnsecurity WAPT v2 or WAPTx.
  4. There is new gold to be found on the internet, and possibly in your own computer. Secret backdoors, that do not have a digital lock yet, are being traded at astronomical amounts. In the cyber world trade, where there are no rules, you are in luck with "white-hat" hackers, who guard your online security. But their opponents, the "black-hat" hackers, have an interest in an unsecure internet, and sell security leaks to the highest bidder. They are the preferred suppliers of security services and cyber defence. Who are these black and white wizards, who fight for the holy grail of hackers: zero days?
  5. this is eCPPT PTP V.3 module 3 Web Application Security [Hidden Content]
  6. We’re still buzzing and recovering from the Black Hat and DEF CON conferences where we finished presenting our new Kali Linux Dojo, which was a blast. With the help of a few good people, the Dojo rooms were set up ready for the masses – where many generated their very own Kali 2.0 ISOs for the first time. But the excitement doesn’t end for us just yet. With the end of the cons, we now find ourselves smack in the middle of the most significant release of Kali since 2013. Today is the day that Kali 2.0 is officially released. So, what’s new in Kali 2.0? There’s a new 4.0 kernel, now based on Debian Jessie, improved hardware and wireless driver coverage, support for a variety of Desktop Environments (gnome, kde, xfce, mate, e17, lxde, i3wm), updated desktop environment and tools – and the list goes on. But these bulletpoint items are essentially a side effect of the real changes that have taken place in our development backend. Ready to hear the real news? Take a deep breath, it’s a long list. video demo Download Kali Linux Images [Hidden Content]
  7. Youtube links SANS Pen Test: Webcast - Utilizing ROP on Windows 10 | A Taste of SANS SEC660 [Hidden Content] SANS WEBCAST: A Taste of What's New in SEC504 with John Strand [Hidden Content] SANS Pen Test: Webcast - Adventures in High Value Pen Testing A Taste of SANS SEC560 [Hidden Content] SANS Pen Test: Webcast - 8 Mobile Device Security Steps w/ Chris Crowley [Hidden Content]
  8. Thx man share this file IFGI_CGI LABS_forensicImage.rar?
  9. SEC580: Metasploit Kung Fu for Enterprise Pen Testing 2011 Video [Hidden Content]
  10. WAPT v2 is an amazing course high quality
  • Create New...