Date Author Title

PENTEST RESULTS SHARING

2010-11-19Jason LamExchanging and sharing of assessment results

PENTEST

2019-11-29/a>Russ McReeISC Snapshot: Search with SauronEye
2018-01-28/a>Didier StevensIs this a pentest?
2017-09-06/a>Adrien de BeaupreModern Web Application Penetration Testing , Hash Length Extension Attacks
2017-05-05/a>Xavier MertensHTTP Headers... the Achilles' heel of many applications
2016-11-02/a>Rob VandenBrinkWhat Does a Pentest Look Like?
2016-09-28/a>Xavier MertensSNMP Pwn3ge
2016-01-20/a>Xavier Mertens/tmp, %TEMP%, ~/Desktop, T:\, ... A goldmine for pentesters!
2015-11-09/a>John BambenekICYMI: Widespread Unserialize Vulnerability in Java
2015-10-27/a>Xavier MertensThe "Yes, but..." syndrome
2014-08-12/a>Adrien de BeaupreHost discovery with nmap
2013-08-21/a>Rob VandenBrinkFibre Channel Reconnaissance - Reloaded
2011-08-26/a>Daniel WesemannUser Agent 007
2010-11-19/a>Jason LamExchanging and sharing of assessment results
2010-06-06/a>Manuel Humberto Santander PelaezNice OS X exploit tutorial
2010-02-22/a>Rob VandenBrinkNew Risks in Penetration Testing
2009-05-31/a>Tony CarothersL0phtcrack is Back!

RESULTS

2010-11-19/a>Jason LamExchanging and sharing of assessment results

SHARING

2022-03-24/a>Xavier MertensMalware Delivered Through Free Sharing Tool
2017-11-25/a>Guy BruneauBenefits associated with the use of Open Source Software
2017-11-17/a>Xavier MertensTop-100 Malicious IP STIX Feed
2017-06-01/a>Xavier MertensSharing Private Data with Webcast Invitations
2015-12-24/a>Xavier MertensUnity Makes Strength
2014-02-28/a>Daniel WesemannOversharing
2012-12-20/a>Daniel WesemannWhite House strategy on security information sharing and safeguarding
2011-01-12/a>Richard PorterYet Another Data Broker? AOL Lifestream.
2010-11-19/a>Jason LamExchanging and sharing of assessment results