aweSEC Header
On this website you will find several IT-security related topics with focus on
You will also find articles written by me for various magazines, information on some of my researches and projects as well as reviews on certificates, books, and hardware devices.
I recently finished Offensive Security's "Cracking the Perimeter" course and the associated ... Read more.
I recently finished Offensive Security's "Wireless Attacks" course and the associated ... Read more.
Rezension zu "Penetration Testing mit Metasploit: Eine praktische Einführung", von Frank Neugebauer ... Read more.
Added another book review: "Chained Exploits: Advanced Hacking Attacks from Start to Finish" ... Read more.
I recently finished "A Bug Hunter's Diary"/"Aus dem Tagebuch eines Bughunters" ... Read more.
I've added another hardware keylogger review, see ... Read more.
I recently finished Offensive Security's "Penetration Testing with BackTrack" course and the associated ... Read more.
I recently finished Metasploit: The Penetration Tester's Guide ... Read more.
I finished some time ago InfoSec Institute's Ethical Hacking course and finally got around to write a short review on it. The full review is ... Read more.
KeeLog developed another neat device which allows to capture screenshots of a target system. You can ... Read more.
PESec is a simple and lightweight protector for binaries in the Portable Executable format, and was written in C and Assembly ... Read more.
Download the pre patched version from bindshell.net (john-1.7.3.1-mpi8.tar.gz) and extract the ... Read more.
I recently finished The Art of Assembly Language 2nd Edition by Randall Hyde/ No Starch Press ... Read more.
I've written another article for the Hakin9 magazine (issue 4/2010) - this time I wrote about common disclosure policies ... Read more.
Not too long ago I read the book Influence: The Psychology of Persuasion by Robert Cialdini ... Read more.
The second part of my reverse engineering series was published in the latest ... Read more.
The first book review on CEH study materials is available ... Read more.
Not too long ago I got the opportunity to attend EC-Council's iClass course for the Certiefied Ethical Hacker certification ... Read more.
To continue my hardware keylogger series, I added another review. It's about a 2GB version which comes with timestamp and ... Read more.
I have tested and reviewed another hardware keylogger model - a 4MB USB model by ... Read more.
Two articles I have written some time ago are now available in the latest Hakin9 issue (1/2010) ... Read more.
I have read and reviewed another book with the title Computer-Forensik - Systemeinbrüche erkennen, ermitteln, aufklären, which covers many aspects of computer forensics and ... Read more.
I have read and reviewed two more books. The first one is by Clifford Stoll and is titled ... Read more.
I have uploaded my first two articles which were printed in the Hakin9 magazine with the titles ... Read more.
I have tested and reviewed another hardware keylogger - this time one with Bluetooth-functionality ... Read more.
As indicated in my last news I worked on another hardware review. This time I tested the IronKey Personal USB flash drive and made again... Read more.
I have wrote another review on a book. This time it was on The Art of Deception by famous Kevin Mitnick and ... Read more.
I have written two book reviews. One is about the book Reversing: Secrets of Reverse Engineering by Eldad Eilam and ... Read more.
I have tested and reviewed another Hardware Keylogger in-depth. This time it's a product from KeeLog called ... Read more.
As I am writing an article for the Hakin9 magazine about Hardware Keyloggers I have written a detailed review about ... Read more.
www.awesec.com
Copyright © 2009 - 2014