I just wanted to let you all know about PenTest Magazine cause they have really good offer at the time being
for registering as a free user you get access to free articles, free teasers & 4 free issues - if you want to reach it use this link http://pentestmag.com/subscribe/free-account/
you should definitely check it if you want to have some high quality technical content.
to give you bigger picture some topics they cover
Digital Apocalypse: The Artillery of Cyber War
by Cecilia McGuire
Cyberspace is now the digital frontier of choice for executing many combat operations, by extending the medium in which greater levels of power can now be accessed by Machiavelli agents, militants and nation-states. Squads of cyber militants going under the banner of Anonymous and LulzSecare, motivated by the ease in which they can now execute high impact operations whilst avoiding detection, are just a few of the much publicized names synonymous with cyber terrorism. The multi-dimensional characteristics of cyber space have dissolved the boundaries between digital landscape and physical security, facilitating cyber-attacks that produce devastating impacts to critical infrastructure, as well as Corporate and Government assets.
Auditing & Standards:
Blind BackEnd Attacks
by Stefano Maccaglia & Roberto Mandolesi
During a Remote Pen Testing in Black Box mode, nobody knows initially what the Team will face once the initial compromise of a system has been successfully done.
In fact, the initial target could be a web server, a mail server or even a desktop computer exploited by a drive-by attack. Nevertheless, the next move must be planned and executed in a proper time and fashion. Exploiting a first line, a front end, could ends up in a multitude of possibilities, but also it could bring our task to a premature ending if the subsequent â??jumpâ?? is based on improvisation.
PenTest Web App on web app devices - out on 25th June
Security Products or Door for Hackers? A report on the Vulnerability trends in Security Products
Bikash Barai (---> podlinkowane do -->
As users of computers at work, home and everywhere in between, we rely on a slew of products such as anti-virus software, firewall solutions, authentication tokens and so on that we believe will help make our computer systems more secure. But how secure are such security products themselves? Is there is a real risk that the fence itself might eat the crop?
PenTest Market on Digital Forensics – out on 18th June
Why the Best Web Defense Strategy is Not Defense – It’s Offense
What Effective Web Defense Has in Common with Drunken-Style Kung Fu
By Jason Leung,
If we don’t take the time to understand how attacks are first conceived and designed, building a big wall just to stop the eventual attack will have a slim chance of success. The best pragmatic approach for our industry to stop attacks against web application servers is to stop the attack from happening in the first place. In this manner, we should strive to deceive hackers, to lie to them, to obfuscate the target, and to otherwise frustrate their attempts at discreet reconnaissance and attack vector establishment so that phase 3 – attack implementation – never happens.
+ Reply to Thread
Results 1 to 1 of 1
Thread: do you know pentesting magazine?
06-14-2012, 05:36 AM #1Junior Member
- Join Date
- Jun 2012
do you know pentesting magazine?