Monday, December 25, 2017

A Day In The Life Of A PenTester (Ethical Hacker)!

There is demand for experienced IT Security Professionals, (one million in fact); especially folk that can defend networks and keep prying eyes away from sensitive data. Key to the demand are Cyber Security Professionals that have the actual skills to defend (Blue Team) or attack/ offensive (Red Team); and typically we think about Penetration Testers when this subject come up.

Sunday, October 1, 2017

SpeedTouch Team Writeups for DefCamp CTF 2017

DefCamp is the most important conference on Hacking & Information Security in Central Eastern Europe. The goal is bringing hands-on talks about latest research and practices from the INFOSEC field, gathering under the same roof security specialists, entrepreneurs, academic, private and public sectors.

Wednesday, September 13, 2017

Difference Between White Hat, Gray Hat and a Black Hat Hacker

Today we gonna talk about the difference between a Black Hat, White Hat & Gray Hat Hacker: The word Hacker doesn’t intend to be a bad person in the computer world, much less a virtual “criminal” or “bandit”. Tech writers often point to Hackers breaking them into three categories: Black Hat, White Hat and finally Gray Hat. These terms represent different groups of hackers based on their role towards the connected world.
The definition of the word “Hacker” mean someone who compromises computer security or even a developer practicing open source development or something from that kind.

Monday, September 4, 2017

Can We Use Kali Linux for Regular Daily Use ?

Penetration Testers, Cyber Security Researchers, IT Security Consultants, Script Kiddies most of them use Kali Linux and more. Kali Linux is a Debian-Based Special Made Distribution by Offensive Security for Penetration Testing Purpose.

Friday, August 25, 2017

Capture The Flag (CTF)

Cyber Security is a high priority of companies & governments. Cyber Attacks & Breaches have been on the rise in the last years. By that Security Professionals have been through rigorous training as how HACKERS are able to get into companies & govs infrastructures and how to defend against them.