Hauptmenü
Untermenü

Welcome to aweSEC!

On this website you will find several IT-security related topics with focus on

You will also find articles written by me for various magazines, information on some of my researches and projects as well as reviews on certificates, books, and hardware devices.



Latest News


October 22, 2012 - Course Review: Offensive Security's "Cracking the Perimeter"

I recently finished Offensive Security's "Cracking the Perimeter" course and the associated ... Read more.



March 4, 2012 - Course Review: Offensive Security's "Wireless Attacks"

I recently finished Offensive Security's "Wireless Attacks" course and the associated ... Read more.



March 2, 2012 - Penetration Testing mit Metasploit: Eine praktische Einführung, Review

Rezension zu "Penetration Testing mit Metasploit: Eine praktische Einführung", von Frank Neugebauer ... Read more.



February 20, 2012 - Chained Exploits: Advanced Hacking Attacks from Start to Finish, Review

Added another book review: "Chained Exploits: Advanced Hacking Attacks from Start to Finish" ... Read more.



February 19, 2012 - A Bug Hunter's Diary/Aus dem Tagebuch eines Bughunters, Review

I recently finished "A Bug Hunter's Diary"/"Aus dem Tagebuch eines Bughunters" ... Read more.



February 17, 2012 - Review: KeeLog KeyDemon Wi-Fi Premium

I've added another hardware keylogger review, see ... Read more.



January 7, 2012 - Course Review: Offensive Security's "Penetration Testing with BackTrack"

I recently finished Offensive Security's "Penetration Testing with BackTrack" course and the associated ... Read more.



August 30, 2011 - Metasploit: The Penetration Tester's Guide, Review

I recently finished Metasploit: The Penetration Tester's Guide ... Read more.



May 25, 2011 - Course Review: CPT by InfoSec Institute

I finished some time ago InfoSec Institute's Ethical Hacking course and finally got around to write a short review on it. The full review is ... Read more.



May 4, 2011 - Review: KeeLog VideoGhost

KeeLog developed another neat device which allows to capture screenshots of a target system. You can ... Read more.



April 23, 2011 - PESec

PESec is a simple and lightweight protector for binaries in the Portable Executable format, and was written in C and Assembly ... Read more.



March 30, 2011 - Running John The Ripper MPI on Multi-Cores @ Ubuntu 10.10

Download the pre patched version from bindshell.net (john-1.7.3.1-mpi8.tar.gz) and extract the ... Read more.



August 3, 2010 - The Art of Assembly Language 2nd Edition, Review

I recently finished The Art of Assembly Language 2nd Edition by Randall Hyde/ No Starch Press ... Read more.



May 4, 2010 - Hakin9-Article: Disclosure Policies

I've written another article for the Hakin9 magazine (issue 4/2010) - this time I wrote about common disclosure policies ... Read more.



March 2o, 2010 - Influence: The Psychology of Persuasion - Review

Not too long ago I read the book Influence: The Psychology of Persuasion by Robert Cialdini ... Read more.



March 4, 2010 - Article: IT-Sec mittels Reverse Code Engineering, Teil 2

The second part of my reverse engineering series was published in the latest ... Read more.



March 2, 2010 - Review: CEH : Official Certified Ethical Hacker Review Guide: Exam 312-50

The first book review on CEH study materials is available ... Read more.



March 1, 2010 - CEH - Certified Ethical Hacker

Not too long ago I got the opportunity to attend EC-Council's iClass course for the Certiefied Ethical Hacker certification ... Read more.



February 11, 2010 - Review: KeeLog PS/2 KeyDemon TimeKeeper - Hardware Keylogger

To continue my hardware keylogger series, I added another review. It's about a 2GB version which comes with timestamp and ... Read more.



February 10, 2010 - Review: KeyLlama USB Value - Hardware Keylogger

I have tested and reviewed another hardware keylogger model - a 4MB USB model by ... Read more.



January 7, 2010 - Hakin9-Articles: IT-Sec with Reverse Engineering, Part 1 + Hardware Keylogger - A serious threat

Two articles I have written some time ago are now available in the latest Hakin9 issue (1/2010) ... Read more.



November 27, 2009 - Review: Computer-Forensik - Systemeinbrüche erkennen, ermitteln, aufklären

I have read and reviewed another book with the title Computer-Forensik - Systemeinbrüche erkennen, ermitteln, aufklären, which covers many aspects of computer forensics and ... Read more.



August 12, 2009 - Two more book reviews available

I have read and reviewed two more books. The first one is by Clifford Stoll and is titled ... Read more.



July 28, 2009 - First two articles for download available

I have uploaded my first two articles which were printed in the Hakin9 magazine with the titles ... Read more.



July 7, 2009 - Wireless Keylogger Review available

I have tested and reviewed another hardware keylogger - this time one with Bluetooth-functionality ... Read more.



July 1, 2009 - IronKey review available

As indicated in my last news I worked on another hardware review. This time I tested the IronKey Personal USB flash drive and made again... Read more.



June 24, 2009 - Review on The Art of Deception

I have wrote another review on a book. This time it was on The Art of Deception by famous Kevin Mitnick and ... Read more.



June 17, 2009 - Two book reviews available

I have written two book reviews. One is about the book Reversing: Secrets of Reverse Engineering by Eldad Eilam and ... Read more.



June 15, 2009 - KeeLog review available

I have tested and reviewed another Hardware Keylogger in-depth. This time it's a product from KeeLog called ... Read more.



June 7, 2009 - KeyCarbon Hardware Keylogger Review available

As I am writing an article for the Hakin9 magazine about Hardware Keyloggers I have written a detailed review about ... Read more.



May 27, 2009 - Website went online!

www.awesec.com

Copyright © 2009 - 2014

gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.