lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAC9YSs4aqkT7=0gh8tgHvNXnodyAna8kVsM6VNWpEOLC-KfR6w@mail.gmail.com>
Date: Wed, 23 May 2012 15:49:31 -0400
From: Peter Dawson <slash.pd@...il.com>
To: "Thor (Hammer of God)" <thor@...merofgod.com>
Cc: "full-disclosure@...ts.grok.org.uk" <full-disclosure@...ts.grok.org.uk>
Subject: Re: Certificacion - Profesional Pentester

yes thats true ..but lets not 4get one needs to forkup $150/- before you
can finger their servers

2012/5/23 Thor (Hammer of God) <thor@...merofgod.com>

>  Hell Juan.  As per the conditions of the contract I forwarded, I am
> pleased to see that you have given me full permission to assess any systems
> of yours I feel are within scope.  I’m copying in FD again so they can all
> be witness to the fact you acting in a manner consistent with the terms of
> my contract, and that you have given me full permission to do as I wish
> with any aspect of your network without repercussions.  ****
>
> ** **
>
> I’m looking forward to it!  Thank you.****
>
> ** **
>
> *[image: Description: Description: Description: Description: Description:
> Description: Description: Description: Description: TimSig]***
>
> * *
>
> *Timothy “Thor”  Mullen*
>
> *www.hammerofgod.com*
>
> *Thor’s Microsoft Security Bible<http://www.amazon.com/Thors-Microsoft-Security-Bible-Collection/dp/1597495727>
> *
>
> ** **
>
> ** **
>
> *From:* Juan Sacco [mailto:jsacco@...loitpack.com]
> *Sent:* Wednesday, May 23, 2012 7:59 AM
> *Subject:* Certificacion - Profesional Pentester****
>
> ** **
>
> Certificate como un profesional de la seguridad informática y aprende a
> realizar tu mismo un penetration testing. ****
>
>
> El curso tiene una duración de ( 15 horas de practica en laboratorio ) y
> se entrega diploma y certificado de asistencia. ( Con examen final aprobado
> )****
>
> Primer clase empieza este sabado 26, es ONLINE y en VIVO.
>
> El contenido del curso es técnico y practico, ademas se incluye licencia
> de Exploit Pack ( de regalo ) herramienta la cual utilizaremos para
> realizar testeos de intrusión.
>
> Costo total con descuento: 150 USD****
>
> Registrate ahora:
> https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=UXC4U5BSVP4P4
> ****
>
> ** **
>
> Como se realiza un Buffer Overflow y como prevenirlos?
> - Manejo de memoria
> - Procesamiento y threads
> - Escritura en memoria
> - Compilacion usando GCC
> - Debugging con GDB
> - Tecnicas de proteccion
> - Seguridad web SQL y XSS****
>
> - Debugging de sitios****
>
> - Programacion en Javacript****
>
> - Politicas de segurida
> - Arquitectura de computadores
> - Lenguaje ensamblador
> - Buffer Overflows
> - Escritura y manejo de pilas
> - Exploits con Python
>
> No se requiere ningún conocimiento previo para asistir ya que se empieza
> desde cero. ****
>
> ** **
>
> Saludos****
>
> Juan Sacco****
>
> Exploit Pack****
>
> http://exploitpack.com****
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>

Content of type "text/html" skipped

Download attachment "image001.png" of type "image/png" (1049 bytes)

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ