<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet href="https://offsec.com/feed.xsl" type="text/xsl"?><rss version="2.0"><channel><title>OffSec RSS Feed</title><description>Establish &amp; advance your career with Offensive Security&apos;s online cybersecurity training, courses and certifications. Develop the Try Harder mindset today!</description><link>https://www.offsec.com</link><item><title>Shadow AI: How Unsanctioned Tools Create Invisible Risk</title><link>https://www.offsec.com/blog/shadow-ai-risks/</link><guid isPermaLink="true">https://www.offsec.com/blog/shadow-ai-risks/</guid><description>Over 80% of workers use unapproved AI tools. Learn how shadow AI creates hidden attack surface and what security teams can do to detect and address it.</description><pubDate>Wed, 01 Apr 2026 13:17:18 GMT</pubDate></item><item><title>OffSec and Deloitte Portugal Announces Strategic Partnership</title><link>https://www.offsec.com/blog/offsec-and-deloitte-portugal/</link><guid isPermaLink="true">https://www.offsec.com/blog/offsec-and-deloitte-portugal/</guid><description>Announcing a strategic partnership with Deloitte Portugal to help organizations strengthen the technical capabilities of their security teams.</description><pubDate>Mon, 30 Mar 2026 11:27:01 GMT</pubDate></item><item><title>8 Ways to Stay Motivated During Exam Prep</title><link>https://www.offsec.com/blog/8-ways-to-stay-motivated-during-exam-prep/</link><guid isPermaLink="true">https://www.offsec.com/blog/8-ways-to-stay-motivated-during-exam-prep/</guid><description>Preparing for an OffSec certification exam is a technical and psychological journey. Here are some expert strategies to help during your OffSec exam prep!</description><pubDate>Mon, 16 Mar 2026 17:14:13 GMT</pubDate></item><item><title>OSCP to OSAI: How Offensive Security Practitioners Can Pivot Into AI Security</title><link>https://www.offsec.com/blog/oscp-to-osai-how-offensive-security-practitioners-can-pivot-into-ai-security/</link><guid isPermaLink="true">https://www.offsec.com/blog/oscp-to-osai-how-offensive-security-practitioners-can-pivot-into-ai-security/</guid><description>OSCP holders already have the adversarial mindset AI red teaming demands. Learn what transfers, what&amp;#8217;s new, and how to close the gap from OSCP to OSAI efficiently.</description><pubDate>Fri, 13 Mar 2026 18:16:24 GMT</pubDate></item><item><title>The AI Security Skills Gap: What It Is, Where It Exists, and How to Close It</title><link>https://www.offsec.com/blog/the-ai-security-skills-gap/</link><guid isPermaLink="true">https://www.offsec.com/blog/the-ai-security-skills-gap/</guid><description>The AI security skills gap threatens enterprise AI investments. Learn where skills gaps exist across security teams and how hands-on training closes them.</description><pubDate>Tue, 10 Mar 2026 21:31:34 GMT</pubDate></item><item><title>Careers in Offensive AI Security: Roles, Skills, and Pathways</title><link>https://www.offsec.com/blog/careers-in-offensive-ai-security/</link><guid isPermaLink="true">https://www.offsec.com/blog/careers-in-offensive-ai-security/</guid><description>At OffSec, we are building OSAI, our offensive AI security certification, to help practitioners extend adversary-driven methodology into AI-enabled environments already entering production. That initiative reflects a broader shift happening across the industry. As AI-enabled features move into production systems, customer platforms, and internal operations, organizations are recognizing that these capabilities expand the attack surface</description><pubDate>Fri, 27 Feb 2026 13:52:35 GMT</pubDate></item><item><title>Building an AI-Ready Cybersecurity Team</title><link>https://www.offsec.com/blog/building-an-ai-ready-cybersecurity-team/</link><guid isPermaLink="true">https://www.offsec.com/blog/building-an-ai-ready-cybersecurity-team/</guid><description>A practical framework for security leaders to build AI-ready teams. Learn to assess capabilities, prioritize training, and balance AI with foundational skills.</description><pubDate>Tue, 17 Feb 2026 18:14:16 GMT</pubDate></item><item><title>The Skills That Will Matter for Offensive AI Security in 2026</title><link>https://www.offsec.com/blog/offensive-ai-security-skills-2026/</link><guid isPermaLink="true">https://www.offsec.com/blog/offensive-ai-security-skills-2026/</guid><description>Before tools, before frameworks, before hype, offensive security has always been about one thing: Thinking like an attacker. That foundation now defines the offensive AI security skills practitioners will need as AI reshapes the attack surface. AI systems introduce new behaviors and new failure modes, but the core mindset remains the same: understand how a</description><pubDate>Fri, 13 Feb 2026 13:00:14 GMT</pubDate></item><item><title>Defending Against AI-Powered Cyber Attacks: Why Your Blue Team Needs New Skills</title><link>https://www.offsec.com/blog/defending-against-ai-powered-cyber-attacks/</link><guid isPermaLink="true">https://www.offsec.com/blog/defending-against-ai-powered-cyber-attacks/</guid><description>AI-powered cyber attacks are outpacing traditional defenses. Learn the four key threat categories and the new skills blue teams need to defend against them.</description><pubDate>Wed, 04 Feb 2026 16:00:21 GMT</pubDate></item><item><title>CVE-2026-24061 – GNU InetUtils telnetd Authentication Bypass Vulnerability</title><link>https://www.offsec.com/blog/cve-2026-24061/</link><guid isPermaLink="true">https://www.offsec.com/blog/cve-2026-24061/</guid><description>CVE-2026-24061 enables unauthenticated attackers to exploit GNU telnetd and gain immediate root shells over the network.</description><pubDate>Fri, 30 Jan 2026 16:15:44 GMT</pubDate></item><item><title>Thinking Like an Attacker: How Attackers Target AI Systems</title><link>https://www.offsec.com/blog/thinking-like-an-attacker-how-attackers-target-ai-systems/</link><guid isPermaLink="true">https://www.offsec.com/blog/thinking-like-an-attacker-how-attackers-target-ai-systems/</guid><description>In September 2025, security researchers at Anthropic uncovered something unprecedented: an AI-orchestrated espionage campaign where attackers used Claude to perform 80–90% of a sophisticated hacking operation. The AI handled everything from reconnaissance to payload development, demonstrating that artificial intelligence has fundamentally changed the threat landscape, not just as a tool for defenders, but as both</description><pubDate>Wed, 14 Jan 2026 14:04:52 GMT</pubDate></item><item><title>Offensive Security in the Age of AI: Red Teaming LLM</title><link>https://www.offsec.com/blog/red-teaming-llm/</link><guid isPermaLink="true">https://www.offsec.com/blog/red-teaming-llm/</guid><description>LLMs change how red teams test applications. Explore OffSec’s LLM Red Teaming Learning Path and build practical AI testing skills.</description><pubDate>Fri, 09 Jan 2026 17:09:19 GMT</pubDate></item><item><title>How OffSec Maps Cybersecurity Training to Industry Frameworks</title><link>https://www.offsec.com/blog/nist-nice-mitre/</link><guid isPermaLink="true">https://www.offsec.com/blog/nist-nice-mitre/</guid><description>How MITRE ATT&amp;amp;CK, D3FEND, and NICE/NIST frameworks help connect hands-on cybersecurity training to real-world work.</description><pubDate>Fri, 09 Jan 2026 16:46:59 GMT</pubDate></item><item><title>Closing Out 2025 with Gratitude (and Momentum)</title><link>https://www.offsec.com/blog/closing-out-2025-with-gratitude-and-momentum/</link><guid isPermaLink="true">https://www.offsec.com/blog/closing-out-2025-with-gratitude-and-momentum/</guid><description>To the OffSec community, As 2025 comes to a close, we want to pause and say thank you. Whether you trained with us, earned a certification, hired through our platform, or cheered others on from the sidelines, you helped make this year one of our most meaningful yet. This year, we focused on one goal:</description><pubDate>Fri, 19 Dec 2025 11:21:26 GMT</pubDate></item><item><title>6 Benefits of a Fully Certified Cybersecurity Team</title><link>https://www.offsec.com/blog/benefits-of-a-fully-certified-cybersecurity-team/</link><guid isPermaLink="true">https://www.offsec.com/blog/benefits-of-a-fully-certified-cybersecurity-team/</guid><description>Discover 6 key benefits of a fully certified cybersecurity team, from faster onboarding to confident hiring. Learn how unified training drives performance.</description><pubDate>Tue, 16 Dec 2025 15:40:17 GMT</pubDate></item><item><title>Blue Team vs Red Team: Should Defenders Learn Offensive Skills?</title><link>https://www.offsec.com/blog/should-defenders-learn-offensive-skills/</link><guid isPermaLink="true">https://www.offsec.com/blog/should-defenders-learn-offensive-skills/</guid><description>Discover why blue team defenders benefit from red team skills. Learn how offensive knowledge improves detection, incident response, and career growth.</description><pubDate>Tue, 16 Dec 2025 15:34:28 GMT</pubDate></item><item><title>How Will AI Affect Cybersecurity?</title><link>https://www.offsec.com/blog/how-will-ai-affect-cybersecurity/</link><guid isPermaLink="true">https://www.offsec.com/blog/how-will-ai-affect-cybersecurity/</guid><description>As organizations deploy AI tools to improve detection accuracy, streamline investigations, and strengthen defenses, threat actors are leveraging the same technologies to develop more efficient and adaptive attack methods.&amp;nbsp; This article outlines the current and emerging roles of AI in cybersecurity, including its defensive applications, its misuse by attackers, and the new attack surfaces it</description><pubDate>Tue, 09 Dec 2025 13:36:56 GMT</pubDate></item><item><title>How to Gain Experience in Cybersecurity</title><link>https://www.offsec.com/blog/how-to-gain-experience-in-cybersecurity/</link><guid isPermaLink="true">https://www.offsec.com/blog/how-to-gain-experience-in-cybersecurity/</guid><description>Developing meaningful experience in the cybersecurity field is a common challenge for professionals who have already entered the industry and want to advance their cybersecurity skills.&amp;nbsp; As roles become more technical and responsibilities broaden, it becomes clear that foundational exposure alone is not enough. Employers expect practitioners to demonstrate practical capability, sound judgment, and the</description><pubDate>Tue, 09 Dec 2025 13:32:24 GMT</pubDate></item><item><title>CVE-2025-55182 – React Server Components RCE via Flight Payload Deserialization</title><link>https://www.offsec.com/blog/cve-2025-55182/</link><guid isPermaLink="true">https://www.offsec.com/blog/cve-2025-55182/</guid><description>React Server Components promise less client-side JavaScript, but that convenience can hide serious risk. Learn how CVE-2025-55182 (CVSS 10.0) enables critical RCE in the RSC ecosystem, why it happened, and how the public exploit works against React’s server-side handling.</description><pubDate>Fri, 05 Dec 2025 17:34:41 GMT</pubDate></item><item><title>Why Enterprises Are Moving from Generic Cyber Training to Cyber Ranges</title><link>https://www.offsec.com/blog/enterprise-cyber-training-ranges/</link><guid isPermaLink="true">https://www.offsec.com/blog/enterprise-cyber-training-ranges/</guid><description>Transform enterprise cyber training with realistic cyber ranges. Move beyond generic courses to hands-on attack simulations in production-like environments.</description><pubDate>Wed, 05 Nov 2025 15:52:20 GMT</pubDate></item><item><title>Unauthenticated Remote Code Execution Vulnerability in WSUS Service</title><link>https://www.offsec.com/blog/recent-vulnerabilities-in-wsus-service/</link><guid isPermaLink="true">https://www.offsec.com/blog/recent-vulnerabilities-in-wsus-service/</guid><description>CVE-2025-59287 exposes a critical WSUS deserialization flaw enabling unauthenticated remote code execution via unsafe AuthorizationCookie handling. Learn the risks and fixes.</description><pubDate>Mon, 03 Nov 2025 16:50:23 GMT</pubDate></item><item><title>Save 20% on OffSec’s Learn One!</title><link>https://www.offsec.com/blog/learn-one-promo/</link><guid isPermaLink="true">https://www.offsec.com/blog/learn-one-promo/</guid><description>Get 20% off Learn One with labs, exams, and certifications. Act fast! Discount will be gone in a flash.</description><pubDate>Thu, 30 Oct 2025 13:03:34 GMT</pubDate></item><item><title>From Failure to 100: How Akas Earned His OSCP+</title><link>https://www.offsec.com/blog/from-failure-to-100-how-akas-earned-his-oscp/</link><guid isPermaLink="true">https://www.offsec.com/blog/from-failure-to-100-how-akas-earned-his-oscp/</guid><description>In this guide, we’re sharing an inspiring story from one of our OSCP+ Certified Holders who embodies the journey of Try Harder. We’d like to introduce you to Akas Wisnu Aji (justakazh), a Cyber Security Consultant from Indonesia, who became certified in May 2025 after overcoming two failed attempts. Instead of giving up, Akas chose</description><pubDate>Fri, 24 Oct 2025 11:08:32 GMT</pubDate></item><item><title>OSCP vs. OSWE: Which Certification Fits Your Career Goals?</title><link>https://www.offsec.com/blog/oscp-vs-oswe/</link><guid isPermaLink="true">https://www.offsec.com/blog/oscp-vs-oswe/</guid><description>OSCP vs OSWE: find out which OffSec certification suits you best! Build pen testing expertise or master advanced web exploit development.</description><pubDate>Wed, 22 Oct 2025 14:48:09 GMT</pubDate></item><item><title>Recent Vulnerabilities in Redis Server’s Lua Scripting Engine</title><link>https://www.offsec.com/blog/recent-vulnerabilities-in-redis-servers-lua-scripting-engine/</link><guid isPermaLink="true">https://www.offsec.com/blog/recent-vulnerabilities-in-redis-servers-lua-scripting-engine/</guid><description>Discover multiple Redis CVEs, including the critical CVE-2025-49844 — a 13-year-old use-after-free vulnerability in the Lua parser that can allow remote code execution and server crashes.</description><pubDate>Mon, 20 Oct 2025 14:21:20 GMT</pubDate></item><item><title>The Complete Guide to Preparing for Your First OffSec Certification</title><link>https://www.offsec.com/blog/offsec-certification-preparation-guide/</link><guid isPermaLink="true">https://www.offsec.com/blog/offsec-certification-preparation-guide/</guid><description>Prepare for your first OffSec certification with our comprehensive guide. Learn exam structure, costs, technical requirements, and proven study strategies.</description><pubDate>Tue, 14 Oct 2025 10:34:04 GMT</pubDate></item><item><title>Red Teaming vs Pentesting: What’s the Difference?</title><link>https://www.offsec.com/blog/red-teaming-vs-pentesting/</link><guid isPermaLink="true">https://www.offsec.com/blog/red-teaming-vs-pentesting/</guid><description>Discover the differences between red teaming and penetration testing. Learn when to use each approach and how they strengthen your security posture.</description><pubDate>Thu, 18 Sep 2025 17:02:38 GMT</pubDate></item><item><title>How to Prevent Prompt Injection</title><link>https://www.offsec.com/blog/how-to-prevent-prompt-injection/</link><guid isPermaLink="true">https://www.offsec.com/blog/how-to-prevent-prompt-injection/</guid><description>Discover 5 strategies to prevent prompt injection in LLMs. Protect your AI systems against malicious inputs with expert security strategies from OffSec.</description><pubDate>Thu, 18 Sep 2025 17:02:14 GMT</pubDate></item><item><title>What Is Ethical Hacking?</title><link>https://www.offsec.com/blog/what-is-ethical-hacking/</link><guid isPermaLink="true">https://www.offsec.com/blog/what-is-ethical-hacking/</guid><description>Learn what ethical hacking is, how it differs from malicious hacking, and why it&amp;#8217;s crucial for cybersecurity. Explore tools, certifications, and career paths.</description><pubDate>Thu, 18 Sep 2025 17:02:02 GMT</pubDate></item><item><title>Red Team Exercise</title><link>https://www.offsec.com/blog/red-team-exercise/</link><guid isPermaLink="true">https://www.offsec.com/blog/red-team-exercise/</guid><description>Learn how red team exercises simulate real cyberattacks to test defenses. Discover benefits, implementation steps, and how to strengthen your security posture.</description><pubDate>Thu, 18 Sep 2025 16:58:33 GMT</pubDate></item><item><title>Best Cybersecurity Certifications for Beginners</title><link>https://www.offsec.com/blog/best-cybersecurity-certifications-for-beginners/</link><guid isPermaLink="true">https://www.offsec.com/blog/best-cybersecurity-certifications-for-beginners/</guid><description>Discover the best entry-level cybersecurity certifications in 2025. Compare costs, career paths, and earning potential for security certifications from OffSec.</description><pubDate>Thu, 18 Sep 2025 16:52:30 GMT</pubDate></item><item><title>5 Signs You’re Ready for a Career in Cybersecurity</title><link>https://www.offsec.com/blog/5-signs-youre-ready-for-a-career-in-cybersecurity/</link><guid isPermaLink="true">https://www.offsec.com/blog/5-signs-youre-ready-for-a-career-in-cybersecurity/</guid><description>Cybersecurity is one of the most exciting and impactful fields in technology. It offers the chance to solve complex problems, protect critical systems, and make a real difference in how the world stays connected and secure. Every day brings new challenges to explore and new skills to master, making it a career path for those</description><pubDate>Tue, 09 Sep 2025 14:49:43 GMT</pubDate></item><item><title>9 OSCP Study Tips to Help You Succeed</title><link>https://www.offsec.com/blog/oscp-study-tips-to-help-you-succeed/</link><guid isPermaLink="true">https://www.offsec.com/blog/oscp-study-tips-to-help-you-succeed/</guid><description>We’ve gathered some of the best OSCP study tips from the community and compiled them into one place to help prepare you for your upcoming exam!</description><pubDate>Wed, 20 Aug 2025 14:16:56 GMT</pubDate></item><item><title>CVE-2025-29891 – Apache Camel Exploit via CAmelExecCommandArgs Header Injection</title><link>https://www.offsec.com/blog/cve-2025-29891/</link><guid isPermaLink="true">https://www.offsec.com/blog/cve-2025-29891/</guid><description>Discover how CVE-2025-29891 impacts Apache Camel via CAmelExecCommandArgs header injection. Learn how attackers exploit this misconfiguration for remote code execution and how to secure your systems.</description><pubDate>Fri, 08 Aug 2025 13:08:38 GMT</pubDate></item><item><title>CVE-2025-30208 – Vite Arbitrary File Read via @fs Path Traversal Bypass</title><link>https://www.offsec.com/blog/cve-2025-30208/</link><guid isPermaLink="true">https://www.offsec.com/blog/cve-2025-30208/</guid><description>Discover CVE-2025-30208, a critical arbitrary file read vulnerability in the Vite development server. Learn how remote attackers exploit @fs URL handling to access sensitive files.</description><pubDate>Thu, 31 Jul 2025 16:51:27 GMT</pubDate></item><item><title>Get Noticed: 5 Cybersecurity Job Hunt Tips</title><link>https://www.offsec.com/blog/get-noticed-5-cybersecurity-job-hunt-tips/</link><guid isPermaLink="true">https://www.offsec.com/blog/get-noticed-5-cybersecurity-job-hunt-tips/</guid><description>If you’ve already set your heart on your chosen career path, you might understand that getting noticed by the right employer isn’t always straightforward.&amp;nbsp; When we speak with OffSec learners, many will say that getting the first job is the hardest part. Some candidates will spend 6–12 months job-hunting, applying to hundreds of roles with</description><pubDate>Thu, 31 Jul 2025 16:51:16 GMT</pubDate></item><item><title>Talent Finder: The Smarter Way to Hire and Get Hired</title><link>https://www.offsec.com/blog/talent-finder-the-smarter-way-to-hire-and-get-hired/</link><guid isPermaLink="true">https://www.offsec.com/blog/talent-finder-the-smarter-way-to-hire-and-get-hired/</guid><description>Talent Finder connects certified cybersecurity professionals with companies that value proven skill. It’s a smarter way to hire and get hired.</description><pubDate>Thu, 31 Jul 2025 13:26:41 GMT</pubDate></item><item><title>CVE-2025-27136 – LocalS3 CreateBucketConfiguration Endpoint XXE Injection</title><link>https://www.offsec.com/blog/cve-2025-27136/</link><guid isPermaLink="true">https://www.offsec.com/blog/cve-2025-27136/</guid><description>Discover how CVE-2025-27136, a critical XXE vulnerability in LocalS3’s CreateBucketConfiguration endpoint, can be exploited to access sensitive files. Learn how the flaw works and how to mitigate it.</description><pubDate>Thu, 24 Jul 2025 13:51:37 GMT</pubDate></item><item><title>How OffSec Certifications Help You Hire With Confidence</title><link>https://www.offsec.com/blog/hire-with-confidence-with-offsec/</link><guid isPermaLink="true">https://www.offsec.com/blog/hire-with-confidence-with-offsec/</guid><description>Hire cyber talent with confidence: OffSec certifications prove candidates can perform under pressure, not just talk the talk.</description><pubDate>Mon, 21 Jul 2025 23:34:07 GMT</pubDate></item><item><title>CVE-2024-12029 – InvokeAI Deserialization of Untrusted Data vulnerability</title><link>https://www.offsec.com/blog/cve-2024-12029/</link><guid isPermaLink="true">https://www.offsec.com/blog/cve-2024-12029/</guid><description>CVE-2024-12029: A critical deserialization vulnerability in InvokeAI&amp;#8217;s /api/v2/models/install endpoint allows remote code execution via malicious model files. Exploit risk for AI art servers.</description><pubDate>Thu, 17 Jul 2025 16:52:29 GMT</pubDate></item><item><title>What is Phishing? Introduction to Phishing Demo (for Beginners)</title><link>https://www.offsec.com/blog/what-is-phishing-introduction/</link><guid isPermaLink="true">https://www.offsec.com/blog/what-is-phishing-introduction/</guid><description>Learn how phishing attacks work and how to spot them. Watch OffSec’s animated video to protect yourself from scams, spoofed sites, and social engineering.</description><pubDate>Tue, 15 Jul 2025 18:36:51 GMT</pubDate></item><item><title>CVE-2025-27636 – Remote Code Execution in Apache Camel via Case-Sensitive Header Filtering Bypass</title><link>https://www.offsec.com/blog/cve-2025-27636/</link><guid isPermaLink="true">https://www.offsec.com/blog/cve-2025-27636/</guid><description>Discover the critical Apache Camel vulnerability (CVE-2025-27636) that allows remote code execution via case-sensitive HTTP header manipulation in the exec component. Learn how attackers exploit this flaw and how to mitigate it.</description><pubDate>Thu, 10 Jul 2025 15:27:32 GMT</pubDate></item><item><title>CVE-2025-29306 – Unauthenticated Remote Code Execution in FoxCMS v1.2.5 via Unserialize Injection</title><link>https://www.offsec.com/blog/cve-2025-29306/</link><guid isPermaLink="true">https://www.offsec.com/blog/cve-2025-29306/</guid><description>Discover details about CVE-2025-29306, a critical RCE vulnerability in FoxCMS 1.2.5. Learn how unsafe use of PHP&amp;#8217;s unserialize() function enables remote attackers to execute arbitrary system commands.</description><pubDate>Thu, 03 Jul 2025 14:57:12 GMT</pubDate></item><item><title>CVE-2024-39914 – Unauthenticated Command Injection in FOG Project’s export.php</title><link>https://www.offsec.com/blog/cve-2024-39914/</link><guid isPermaLink="true">https://www.offsec.com/blog/cve-2024-39914/</guid><description>Discover details about CVE-2024-39914, a critical unauthenticated command injection vulnerability in FOG Project ≤ 1.5.10.34. Learn how attackers can exploit export.php to execute system commands or deploy persistent webshells.</description><pubDate>Thu, 26 Jun 2025 15:14:28 GMT</pubDate></item><item><title>What It Really Means to “Try Harder”</title><link>https://www.offsec.com/blog/what-it-means-to-try-harder/</link><guid isPermaLink="true">https://www.offsec.com/blog/what-it-means-to-try-harder/</guid><description>Discover how OffSec’s “Try Harder” mantra evolved into a mindset, and how it helps learners build grit, creativity, and real-world problem-solving skills.
</description><pubDate>Mon, 23 Jun 2025 14:09:10 GMT</pubDate></item><item><title>CVE-2025-3248 – Unauthenticated Remote Code Execution in Langflow via Insecure Python exec Usage</title><link>https://www.offsec.com/blog/cve-2025-3248/</link><guid isPermaLink="true">https://www.offsec.com/blog/cve-2025-3248/</guid><description>CVE-2025-3248 is a critical RCE vulnerability in Langflow that allows unauthenticated attackers to execute arbitrary Python code via unsanitized input to exec(). Learn how it works and how to protect your system.</description><pubDate>Wed, 18 Jun 2025 14:01:57 GMT</pubDate></item><item><title>CVE-2024-21683 – Authenticated RCE via “Add a New Language” in Atlassian Confluence</title><link>https://www.offsec.com/blog/cve-2024-21683/</link><guid isPermaLink="true">https://www.offsec.com/blog/cve-2024-21683/</guid><description>Critical RCE vulnerability (CVE-2024-21683) in Atlassian Confluence Data Center and Server (v5.2–8.9.0) allows authenticated users to execute arbitrary code via malicious code macros.</description><pubDate>Thu, 12 Jun 2025 16:14:44 GMT</pubDate></item><item><title>CVE‑2025‑49113 – Post‑Auth Remote Code Execution in Roundcube via PHP Object Deserialization</title><link>https://www.offsec.com/blog/cve-2025-49113/</link><guid isPermaLink="true">https://www.offsec.com/blog/cve-2025-49113/</guid><description>A critical RCE vulnerability (CVSS 9.9) in Roundcube Webmail (&lt;1.5.10, 1.6.0–1.6.10) allows authenticated users to exploit a PHP deserialization flaw. Learn how it works and how to protect your systems.</description><pubDate>Thu, 12 Jun 2025 16:14:26 GMT</pubDate></item><item><title>CVE-2025-24893 – Unauthenticated Remote Code Execution in XWiki via SolrSearch Macro</title><link>https://www.offsec.com/blog/cve-2025-24893/</link><guid isPermaLink="true">https://www.offsec.com/blog/cve-2025-24893/</guid><description>An RCE vulnerability in XWiki was found allowing unauthenticated attackers to execute arbitrary Groovy code remotely without authentication or prior access. </description><pubDate>Thu, 05 Jun 2025 15:39:58 GMT</pubDate></item><item><title>OffSec’s Take on the Global Generative AI Adoption Index</title><link>https://www.offsec.com/blog/offsecs-take-on-the-global-generative-ai-adoption-index/</link><guid isPermaLink="true">https://www.offsec.com/blog/offsecs-take-on-the-global-generative-ai-adoption-index/</guid><description>Discover OffSec&amp;#8217;s take on the latest Global Generative AI Adoption Index report released by AWS. </description><pubDate>Fri, 30 May 2025 14:17:10 GMT</pubDate></item><item><title>CVE-2025-0655 – Remote Code Execution in D-Tale via Unprotected Custom Filters</title><link>https://www.offsec.com/blog/cve-2025-0655/</link><guid isPermaLink="true">https://www.offsec.com/blog/cve-2025-0655/</guid><description>A critical remote code execution (RCE) vulnerability in the D-Tale data visualization tool was identified which allowed attackers to execute arbitrary system exams, abusing an exposed API endpoint. </description><pubDate>Thu, 29 May 2025 15:15:15 GMT</pubDate></item><item><title>Recompiling Your “Self”: A Cybersecurity-Inspired Guide to Resilience</title><link>https://www.offsec.com/blog/recompiling-your-self-a-guide-to-resilience/</link><guid isPermaLink="true">https://www.offsec.com/blog/recompiling-your-self-a-guide-to-resilience/</guid><description>A recap of our mental health OffSec LIVE session, with tips on ensuring intentional change, self-awareness, and digital resilience in cybersecurity.</description><pubDate>Wed, 28 May 2025 12:49:59 GMT</pubDate></item><item><title>CVE-2024-46986 – Arbitrary File Write in Camaleon CMS Leading to RCE</title><link>https://www.offsec.com/blog/cve-2024-46986/</link><guid isPermaLink="true">https://www.offsec.com/blog/cve-2024-46986/</guid><description>A vulnerability was discovered in Camaleon CMS authenticating attackers to write files on the file system which enabled them to execut remote code under certain conditions.</description><pubDate>Thu, 22 May 2025 16:01:50 GMT</pubDate></item><item><title>CVE-2024-2928: MLflow Local File Inclusion via URI Fragment Manipulation</title><link>https://www.offsec.com/blog/cve-2024-2928/</link><guid isPermaLink="true">https://www.offsec.com/blog/cve-2024-2928/</guid><description>Read about an LFI vulnerability disclosed in MLflow which allowed unauthenticated remote attackers to read arbitrary files by exploiting URI fragments containing directory traversal sequences. </description><pubDate>Thu, 15 May 2025 15:41:41 GMT</pubDate></item><item><title>CVE-2025-23211: Tandoor Recipes Jinja2 SSTI to Remote Code Execution</title><link>https://www.offsec.com/blog/cve-2025-23211/</link><guid isPermaLink="true">https://www.offsec.com/blog/cve-2025-23211/</guid><description>A critical SSTI vulnerability was discovered in the open-source meal planning application Tandoor Recipes leading to a full system compromise. </description><pubDate>Thu, 08 May 2025 16:57:08 GMT</pubDate></item><item><title>CVE-2025-29927: Next.js Middleware Authorization Bypass</title><link>https://www.offsec.com/blog/cve-2025-29927/</link><guid isPermaLink="true">https://www.offsec.com/blog/cve-2025-29927/</guid><description>In this CVE blog, we explore a vulnerability in Next.js stemming from the improper trust of the x-middleware-subrequest header. </description><pubDate>Thu, 01 May 2025 17:14:45 GMT</pubDate></item><item><title>When AI Becomes the Weak Link: Rethinking Supply Chain Security</title><link>https://www.offsec.com/blog/ai-and-supply-chain-attacks/</link><guid isPermaLink="true">https://www.offsec.com/blog/ai-and-supply-chain-attacks/</guid><description>AI is becoming a hidden entry point in supply chain attacks. Here’s why it matters and what organizations must do to stay protected.</description><pubDate>Wed, 30 Apr 2025 16:39:02 GMT</pubDate></item><item><title>CVE-2025-32433: Vulnerability in Erlang/OTP SSH Implementation</title><link>https://www.offsec.com/blog/cve-2025-32433/</link><guid isPermaLink="true">https://www.offsec.com/blog/cve-2025-32433/</guid><description>Read about a critical vulnerability found in the SSH implementation of Erlang/OTP arising from improper handling of SSH protocol messages. </description><pubDate>Wed, 23 Apr 2025 14:54:19 GMT</pubDate></item><item><title>CVE-2024-13059: Exploiting Path Traversal in AnythingLLM for Remote Code Execution</title><link>https://www.offsec.com/blog/cve-2024-13059/</link><guid isPermaLink="true">https://www.offsec.com/blog/cve-2024-13059/</guid><description>Discover CVE-2024-13059, a critical vulnerability flat that affects AnythingLLM&amp;#8217;s handling of ASCII filenames in the multer library. 
</description><pubDate>Thu, 17 Apr 2025 18:30:07 GMT</pubDate></item><item><title>How OSCP Holders Can Lead Their Teams to Greater Cybersecurity Resilience</title><link>https://www.offsec.com/blog/champion-oscp-for-your-team/</link><guid isPermaLink="true">https://www.offsec.com/blog/champion-oscp-for-your-team/</guid><description>Champion OSCP training in your organization to build a unified, resilient security team.</description><pubDate>Fri, 11 Apr 2025 14:57:19 GMT</pubDate></item><item><title>CVE-2024-57727: Path Traversal Vulnerability in SimpleHelp Web Application</title><link>https://www.offsec.com/blog/cve-2024-57727/</link><guid isPermaLink="true">https://www.offsec.com/blog/cve-2024-57727/</guid><description>CVE-2024-57727 lets attackers read sensitive files via path traversal in SimpleHelp. Learn more about how attackers exploit this flaw.</description><pubDate>Thu, 10 Apr 2025 14:44:46 GMT</pubDate></item><item><title>AI Penetration Testing: How to Secure LLM Systems</title><link>https://www.offsec.com/blog/ai-penetration-testing/</link><guid isPermaLink="true">https://www.offsec.com/blog/ai-penetration-testing/</guid><description>Explore how AI penetration testing enhances LLM security, addressing unique vulnerabilities and improving cyber defenses.</description><pubDate>Thu, 03 Apr 2025 12:36:06 GMT</pubDate></item><item><title>CVE-2024-9956: Critical WebAuthentication Vulnerability in Google Chrome on Android</title><link>https://www.offsec.com/blog/cve-2024-9956/</link><guid isPermaLink="true">https://www.offsec.com/blog/cve-2024-9956/</guid><description>Discover CVE-2024-9956, a critical Chrome flaw on Android allowing Bluetooth-based PassKey theft, and learn key mitigation strategies.</description><pubDate>Wed, 26 Mar 2025 17:54:27 GMT</pubDate></item><item><title>Learn Secure Java Development with OffSec’s New Course</title><link>https://www.offsec.com/blog/sjd-100/</link><guid isPermaLink="true">https://www.offsec.com/blog/sjd-100/</guid><description>Master secure Java coding with OffSec&amp;#8217;s SJD-100 course. Enhance app security and gain hands-on experience to secure your coding practices.</description><pubDate>Tue, 18 Mar 2025 15:19:39 GMT</pubDate></item><item><title>Creating an Inclusive Cybersecurity Culture</title><link>https://www.offsec.com/blog/inclusive-cybersecurity-culture/</link><guid isPermaLink="true">https://www.offsec.com/blog/inclusive-cybersecurity-culture/</guid><description>Transform your cybersecurity culture by strategically improving women&amp;#8217;s representation and cultivating meaningful inclusion.</description><pubDate>Mon, 17 Mar 2025 18:39:58 GMT</pubDate></item><item><title>PostgreSQL Exploit</title><link>https://www.offsec.com/blog/postgresql-exploit/</link><guid isPermaLink="true">https://www.offsec.com/blog/postgresql-exploit/</guid><description>Sharpen your hacking skills! Learn from our walkthrough of a PostgreSQL exploit in the Nibbles machine on PG Practice. 
</description><pubDate>Wed, 12 Mar 2025 19:20:12 GMT</pubDate></item><item><title>Empowering Women in Cybersecurity: How Education and Training Are Key</title><link>https://www.offsec.com/blog/women-in-cyber-training/</link><guid isPermaLink="true">https://www.offsec.com/blog/women-in-cyber-training/</guid><description>While women represent only 24% of the cybersecurity workforce, hands-on training is changing the game. </description><pubDate>Fri, 28 Feb 2025 17:32:19 GMT</pubDate></item><item><title>Women in Cybersecurity Leadership: Inspiring Role Models at the Top</title><link>https://www.offsec.com/blog/women-in-cybersecurity-leadership/</link><guid isPermaLink="true">https://www.offsec.com/blog/women-in-cybersecurity-leadership/</guid><description>Celebrate Women’s History Month by recognizing the women shaping cybersecurity and driving innovation in the industry.</description><pubDate>Mon, 24 Feb 2025 14:09:37 GMT</pubDate></item><item><title>Addressing the Unique Cybersecurity Challenges Faced by Government Agencies</title><link>https://www.offsec.com/blog/the-cybersecurity-challenges-faced-by-government-agencies/</link><guid isPermaLink="true">https://www.offsec.com/blog/the-cybersecurity-challenges-faced-by-government-agencies/</guid><description>Explore the unique cybersecurity challenges government agencies face and how tailored strategies can protect national security and public trust.</description><pubDate>Wed, 12 Feb 2025 14:07:34 GMT</pubDate></item><item><title>Building a Cyber-Resilient Public Sector Through Hands-on Security Training</title><link>https://www.offsec.com/blog/building-a-cyber-resilient-public-sector-team/</link><guid isPermaLink="true">https://www.offsec.com/blog/building-a-cyber-resilient-public-sector-team/</guid><description>Learn how hands-on cybersecurity training equips public sector teams to protect critical infrastructure, featuring real-world cases from Atlanta, Oldsmar, and Texas that demonstrate why practical experience trumps theoretical knowledge alone. Discover why agencies are moving beyond certifications to combat-ready security training.</description><pubDate>Wed, 05 Feb 2025 19:49:38 GMT</pubDate></item><item><title>CVE-2025-21298: A Critical Windows OLE Zero-Click Vulnerability</title><link>https://www.offsec.com/blog/cve-2025-21298/</link><guid isPermaLink="true">https://www.offsec.com/blog/cve-2025-21298/</guid><description>Explore CVE-2025-21298, a critical Windows OLE zero-click flaw enabling RCE via email. Learn its risks, impact, and how to defend against attacks.</description><pubDate>Mon, 03 Feb 2025 18:12:48 GMT</pubDate></item><item><title>My Journey with IR-200: Becoming an OffSec Certified Incident Responder (OSIR)</title><link>https://www.offsec.com/blog/my-journey-with-ir-200-becoming-an-offsec-certified-incident-responder-osir/</link><guid isPermaLink="true">https://www.offsec.com/blog/my-journey-with-ir-200-becoming-an-offsec-certified-incident-responder-osir/</guid><description>Embark on a journey to become an OffSec Certified Incident Responder (OSIR) through the IR-200 course, as described by a Student Mentor who tested its effectiveness.</description><pubDate>Fri, 24 Jan 2025 17:01:40 GMT</pubDate></item><item><title>A Student Mentor’s TH-200 and OSTH Learning Experience</title><link>https://www.offsec.com/blog/a-student-mentors-th-200-and-osth-learning-experience/</link><guid isPermaLink="true">https://www.offsec.com/blog/a-student-mentors-th-200-and-osth-learning-experience/</guid><description>Explore the TH-200 course &amp;amp; OSTH exam with an OffSec Mentor&amp;#8217;s insights on mastering threat hunting skills.</description><pubDate>Fri, 24 Jan 2025 16:57:09 GMT</pubDate></item><item><title>OffSec Yearly Recap 2024</title><link>https://www.offsec.com/blog/offsec-yearly-recap-2024/</link><guid isPermaLink="true">https://www.offsec.com/blog/offsec-yearly-recap-2024/</guid><description>Join us as we explore all our successes in 2024, including exciting new content, courses, and so much more!</description><pubDate>Mon, 23 Dec 2024 19:06:27 GMT</pubDate></item><item><title>Red Team vs Blue Team in Cybersecurity</title><link>https://www.offsec.com/blog/red-team-vs-blue-team/</link><guid isPermaLink="true">https://www.offsec.com/blog/red-team-vs-blue-team/</guid><description>Learn what a red team and blue team in cybersecurity are, pros and cons of both, as well as how they work together. </description><pubDate>Fri, 13 Dec 2024 22:26:12 GMT</pubDate></item><item><title>Building a Future-Ready Cybersecurity Workforce: The OffSec Approach to Talent Development</title><link>https://www.offsec.com/blog/building-a-future-ready-cybersecurity-workforce/</link><guid isPermaLink="true">https://www.offsec.com/blog/building-a-future-ready-cybersecurity-workforce/</guid><description>Learn all about our recent webinar “Building a Future-Ready Cyber Workforce: The OffSec Approach to Talent Development”. </description><pubDate>Fri, 13 Dec 2024 22:24:03 GMT</pubDate></item><item><title>How to Become the Company Top Cyber Talent Wants to Join</title><link>https://www.offsec.com/blog/how-to-become-the-company-top-cyber-talent-wants-to-join/</link><guid isPermaLink="true">https://www.offsec.com/blog/how-to-become-the-company-top-cyber-talent-wants-to-join/</guid><description>Become the company cybersecurity talent wants to join. Learn how to attract, assess, and retain experts with strategies that set you apart.</description><pubDate>Wed, 04 Dec 2024 15:13:57 GMT</pubDate></item><item><title>Evolve APAC 2024: Key Insights</title><link>https://www.offsec.com/blog/evolve-apac-2024-key-insights/</link><guid isPermaLink="true">https://www.offsec.com/blog/evolve-apac-2024-key-insights/</guid><description>Discover key insights from Evolve APAC 2024 on building skills, career growth, and tackling cybersecurity challenges with expert advice.</description><pubDate>Thu, 21 Nov 2024 15:41:24 GMT</pubDate></item><item><title>How to Use Assessments for a Skills Gap Analysis</title><link>https://www.offsec.com/blog/how-to-use-assessments/</link><guid isPermaLink="true">https://www.offsec.com/blog/how-to-use-assessments/</guid><description>Discover how OffSec&amp;#8217;s Learning Paths help organizations perform skills gap analyses, validate expertise, and strengthen cybersecurity teams.</description><pubDate>Tue, 19 Nov 2024 16:27:11 GMT</pubDate></item><item><title>The Human Side of Incident Response</title><link>https://www.offsec.com/blog/the-human-side-of-incident-response/</link><guid isPermaLink="true">https://www.offsec.com/blog/the-human-side-of-incident-response/</guid><description>Effective incident response requires decision-making, adaptability, collaboration, stress management, and a commitment to continuous learning.</description><pubDate>Fri, 08 Nov 2024 17:50:10 GMT</pubDate></item><item><title>Master Incident Response with Hands-On Training in IR-200: Foundational Incident Response</title><link>https://www.offsec.com/blog/announcing-ir-200/</link><guid isPermaLink="true">https://www.offsec.com/blog/announcing-ir-200/</guid><description>OffSec is excited to announce the immediate availability of a new course: IR-200: Foundational Incident Response. </description><pubDate>Tue, 29 Oct 2024 14:12:09 GMT</pubDate></item><item><title>Beyond the Resume: Effective Techniques for Qualifying Top Cybersecurity Talent</title><link>https://www.offsec.com/blog/effective-techniques-for-qualifying-cyber-talent/</link><guid isPermaLink="true">https://www.offsec.com/blog/effective-techniques-for-qualifying-cyber-talent/</guid><description>Building a cybersecurity team takes more than resumes. Discover effective techniques to identify top talent ready to tackle today&amp;#8217;s cyber threats.</description><pubDate>Thu, 24 Oct 2024 16:51:42 GMT</pubDate></item><item><title>How to Upskill and Fill Cybersecurity Skill Gaps on Your Team With Custom Learning Paths</title><link>https://www.offsec.com/blog/how-to-upskill-with-custom-learning-paths/</link><guid isPermaLink="true">https://www.offsec.com/blog/how-to-upskill-with-custom-learning-paths/</guid><description>Learn how to upskill your team with tailored learning paths, ensuring relevant, actionable training for real-world challenges.</description><pubDate>Thu, 24 Oct 2024 16:17:24 GMT</pubDate></item><item><title>What is Incident Response?</title><link>https://www.offsec.com/blog/what-is-incident-response/</link><guid isPermaLink="true">https://www.offsec.com/blog/what-is-incident-response/</guid><description>Learn what incident response is, why it&amp;#8217;s crucial, the steps involved, and how to build a team to effectively manage cybersecurity incidents.</description><pubDate>Mon, 21 Oct 2024 15:23:41 GMT</pubDate></item><item><title>How to Attract Top Cybersecurity Talent</title><link>https://www.offsec.com/blog/how-to-attract-top-cybersecurity-talent/</link><guid isPermaLink="true">https://www.offsec.com/blog/how-to-attract-top-cybersecurity-talent/</guid><description>Attract top cybersecurity talent by defining your value, supporting growth with education, fostering a positive culture, and offering flexibility.</description><pubDate>Tue, 15 Oct 2024 17:51:23 GMT</pubDate></item><item><title>What is Threat Intelligence? </title><link>https://www.offsec.com/blog/what-is-threat-intelligence/</link><guid isPermaLink="true">https://www.offsec.com/blog/what-is-threat-intelligence/</guid><description>This article explores threat intelligence, its purpose, types, and how organizations can leverage it to enhance cybersecurity.</description><pubDate>Fri, 27 Sep 2024 14:49:19 GMT</pubDate></item><item><title>Mental Toughness in Cybersecurity: Preparing Teams for High-Pressure Situations</title><link>https://www.offsec.com/blog/mental-toughness-in-cybersecurity/</link><guid isPermaLink="true">https://www.offsec.com/blog/mental-toughness-in-cybersecurity/</guid><description>Mental toughness helps cybersecurity teams improve decision-making, collaboration, and resilience, enabling them to perform under constant pressure.</description><pubDate>Fri, 20 Sep 2024 12:38:47 GMT</pubDate></item><item><title>The Role of Leadership in Cultivating a Resilient Cybersecurity Team</title><link>https://www.offsec.com/blog/the-role-of-leadership-in-cultivating-a-resilient-cybersecurity-team/</link><guid isPermaLink="true">https://www.offsec.com/blog/the-role-of-leadership-in-cultivating-a-resilient-cybersecurity-team/</guid><description>Learn about the role that leadership plays in cultivating a resilient cybersecurity team. </description><pubDate>Fri, 13 Sep 2024 18:17:26 GMT</pubDate></item><item><title>Navigating the Leap: My Journey from Software Engineering to Offensive Security</title><link>https://www.offsec.com/blog/navigating-the-leap-my-journey-from-software-engineering-to-offensive-security/</link><guid isPermaLink="true">https://www.offsec.com/blog/navigating-the-leap-my-journey-from-software-engineering-to-offensive-security/</guid><description>A software engineer&amp;#8217;s journey into offensive security, sharing insights and tips for transitioning careers and thriving in the infosec field.</description><pubDate>Fri, 13 Sep 2024 13:44:42 GMT</pubDate></item><item><title>Become a Certified Threat Hunter with OffSec’s New Foundational Threat Hunting Course (TH-200)</title><link>https://www.offsec.com/blog/announcement-th-200/</link><guid isPermaLink="true">https://www.offsec.com/blog/announcement-th-200/</guid><description>Everything you need to know about OffSec&amp;#8217;s new course and certification &amp;#8211; TH:200 &amp;#8211; Foundational Threat Hunting. </description><pubDate>Mon, 09 Sep 2024 20:29:25 GMT</pubDate></item><item><title>Building Cyber Resilience: How Continuous Training Fortifies Organizational Security</title><link>https://www.offsec.com/blog/cyber-resilience-and-continuous-training/</link><guid isPermaLink="true">https://www.offsec.com/blog/cyber-resilience-and-continuous-training/</guid><description>Explore how continuous cybersecurity training helps organizations fight cyber threats and become and remain resilient.</description><pubDate>Mon, 09 Sep 2024 20:24:31 GMT</pubDate></item><item><title>Key Takeaways from the Fortinet Skills Gap Report: Why Cybersecurity Training is Crucial for Mitigating Cyber Risk </title><link>https://www.offsec.com/blog/key-takeaways-from-the-fortinet-skills-gap-report/</link><guid isPermaLink="true">https://www.offsec.com/blog/key-takeaways-from-the-fortinet-skills-gap-report/</guid><description>The Fortinet 2024 Skills Gap report shines a light on critical issues that plague the cybersecurity industry. Here are our main takeaways. </description><pubDate>Fri, 06 Sep 2024 17:08:34 GMT</pubDate></item><item><title>Top 5 Best Talks from Black Hat USA 2024</title><link>https://www.offsec.com/blog/top-5-best-talks-from-black-hat-usa-2024/</link><guid isPermaLink="true">https://www.offsec.com/blog/top-5-best-talks-from-black-hat-usa-2024/</guid><description>The OffSec team was at the Black Hat USA 2024 conference and we are excited to share our top 5 favorite talks.</description><pubDate>Fri, 06 Sep 2024 17:02:10 GMT</pubDate></item><item><title>Everything you need to know about the OSCP+</title><link>https://www.offsec.com/blog/everything-you-need-to-know-about-the-oscp-plus/</link><guid isPermaLink="true">https://www.offsec.com/blog/everything-you-need-to-know-about-the-oscp-plus/</guid><description>We&amp;#8217;re sharing all of the important information related to the OSCP+ so you can know what this means for past, current and future learners. </description><pubDate>Wed, 04 Sep 2024 16:38:58 GMT</pubDate></item><item><title>What is Threat Hunting?</title><link>https://www.offsec.com/blog/what-is-threat-hunting/</link><guid isPermaLink="true">https://www.offsec.com/blog/what-is-threat-hunting/</guid><description>Learn about what is threat hunting, the techniques, tools, how to get started in threat hunting and its importance for organizations</description><pubDate>Tue, 03 Sep 2024 15:51:31 GMT</pubDate></item><item><title>Key Strategies for Building Cyber Workforce Resilience</title><link>https://www.offsec.com/blog/key-strategies-for-cyber-workforce-resilience/</link><guid isPermaLink="true">https://www.offsec.com/blog/key-strategies-for-cyber-workforce-resilience/</guid><description>Discover the key strategies for building a cyber-resilient workforce to strengthen your organization&amp;#8217;s cybersecurity defenses.</description><pubDate>Thu, 29 Aug 2024 15:25:43 GMT</pubDate></item><item><title>Overcoming Challenges in Defensive Cybersecurity Teams with an Offensive Mindset</title><link>https://www.offsec.com/blog/offensive-mindset-in-cybersecurity-defense/</link><guid isPermaLink="true">https://www.offsec.com/blog/offensive-mindset-in-cybersecurity-defense/</guid><description>Learn how OffSec empowers defensive cybersecurity teams to adopt an offensive mindset and overcoming their challenges.</description><pubDate>Tue, 27 Aug 2024 16:53:37 GMT</pubDate></item><item><title># OffSec 500 – Community Update 1</title><link>https://www.offsec.com/blog/offsec-500-community-update/</link><guid isPermaLink="true">https://www.offsec.com/blog/offsec-500-community-update/</guid><description>OffSec 500 participants are making huge strides! Check out the leaderboard and read Tristram’s inspiring weight loss story.</description><pubDate>Fri, 23 Aug 2024 19:53:26 GMT</pubDate></item><item><title>Post-quantum Cryptography in 2024</title><link>https://www.offsec.com/blog/post-quantum-cryptography/</link><guid isPermaLink="true">https://www.offsec.com/blog/post-quantum-cryptography/</guid><description>Explore post-quantum cryptography&amp;#8217;s rise in 2024 and how new standards prepare us for future quantum attacks, ensuring secure data.
</description><pubDate>Thu, 22 Aug 2024 11:41:22 GMT</pubDate></item><item><title>Strengthening Your Cyber Defenses: The Critical Role of Defensive Training</title><link>https://www.offsec.com/blog/defensive-cybersecurity-training/</link><guid isPermaLink="true">https://www.offsec.com/blog/defensive-cybersecurity-training/</guid><description>Learn all about defensive cybersecurity and how OffSec’s programs empower professionals to build strong defenses.</description><pubDate>Tue, 20 Aug 2024 15:15:46 GMT</pubDate></item><item><title>Education Sector Common Breaches and Cyber Threats</title><link>https://www.offsec.com/blog/education-sector-common-breaches-and-cyber-threats/</link><guid isPermaLink="true">https://www.offsec.com/blog/education-sector-common-breaches-and-cyber-threats/</guid><description>Learn about the most common threats and biggest data breaches for the educational sector. </description><pubDate>Thu, 08 Aug 2024 19:05:42 GMT</pubDate></item><item><title>How to Become a Cybersecurity Engineer</title><link>https://www.offsec.com/blog/how-to-become-a-cybersecurity-engineer/</link><guid isPermaLink="true">https://www.offsec.com/blog/how-to-become-a-cybersecurity-engineer/</guid><description>Learn how to become a cybersecurity engineer, including the educational paths to follow, the crucial skills and certifications needed, and more.</description><pubDate>Thu, 08 Aug 2024 18:57:21 GMT</pubDate></item><item><title>Top Technology Sector Breaches and Threats</title><link>https://www.offsec.com/blog/top-technology-sector-breaches-and-threats/</link><guid isPermaLink="true">https://www.offsec.com/blog/top-technology-sector-breaches-and-threats/</guid><description> Discover the top 5 cyber threats targeting tech companies, learn from major data breaches, and explore how OffSec&amp;#8217;s cybersecurity training can equip you to defend against evolving attacks.  Safeguard your organization&amp;#8217;s future.</description><pubDate>Mon, 05 Aug 2024 17:40:22 GMT</pubDate></item><item><title>What Is Cloud Penetration Testing?</title><link>https://www.offsec.com/blog/cloud-penetration-testing/</link><guid isPermaLink="true">https://www.offsec.com/blog/cloud-penetration-testing/</guid><description>Learn all about cloud penetration testing, common methods and tools, as well as the benefits and best practices. 
</description><pubDate>Wed, 31 Jul 2024 15:12:18 GMT</pubDate></item><item><title>Unleash Your Skills at OffSec’s Versus Tournament</title><link>https://www.offsec.com/blog/offsec-versus-tournament/</link><guid isPermaLink="true">https://www.offsec.com/blog/offsec-versus-tournament/</guid><description>Visit OffSec at our booth at Black Hat USA and sign up for the free Versus Tournament to test your mettle and win awesome prizes!
</description><pubDate>Wed, 17 Jul 2024 13:58:06 GMT</pubDate></item><item><title>How to Get Into Cybersecurity: A Beginner’s Roadmap</title><link>https://www.offsec.com/blog/how-to-get-into-cybersecurity/</link><guid isPermaLink="true">https://www.offsec.com/blog/how-to-get-into-cybersecurity/</guid><description>Learn how to get into cybersecurity with our step-by-step guide to ensure a successful career.</description><pubDate>Tue, 16 Jul 2024 16:13:49 GMT</pubDate></item><item><title>Top Government Breaches and Threats</title><link>https://www.offsec.com/blog/top-government-breaches-and-threats/</link><guid isPermaLink="true">https://www.offsec.com/blog/top-government-breaches-and-threats/</guid><description>
Explore major government breaches, common cyber threats, and how advanced cybersecurity training enhances resilience, mitigates damage, and protects critical services.</description><pubDate>Tue, 16 Jul 2024 14:18:53 GMT</pubDate></item><item><title>RegreSSHion exploit, CVE-2024-6387: A Write-Up</title><link>https://www.offsec.com/blog/regresshion-exploit-cve-2024-6387/</link><guid isPermaLink="true">https://www.offsec.com/blog/regresshion-exploit-cve-2024-6387/</guid><description>In this blog post, we will be explaining the new RegreSSHion exploit, CVE-2024-6387 and how it works. 
</description><pubDate>Mon, 08 Jul 2024 17:16:07 GMT</pubDate></item><item><title>Why Training IT Teams in Security is Essential for Every Business</title><link>https://www.offsec.com/blog/cybersecurity-training-for-it-teams/</link><guid isPermaLink="true">https://www.offsec.com/blog/cybersecurity-training-for-it-teams/</guid><description>Cybersecurity training for IT teams can bring many benefits to organizations of all sizes. Get the full scoop. </description><pubDate>Wed, 03 Jul 2024 18:25:33 GMT</pubDate></item><item><title>The 5 Biggest Cyber Threats for Financial Services</title><link>https://www.offsec.com/blog/finance-under-siege/</link><guid isPermaLink="true">https://www.offsec.com/blog/finance-under-siege/</guid><description>Financial institutions face a rising tide of cyber threats. This article examines the biggest cybersecurity risks, the financial fallout of breaches, and how OffSec&amp;#8217;s training can equip you to defend your organization.</description><pubDate>Tue, 02 Jul 2024 18:36:00 GMT</pubDate></item><item><title>Best Cybersecurity Certifications in 2025</title><link>https://www.offsec.com/blog/best-cybersecurity-certifications/</link><guid isPermaLink="true">https://www.offsec.com/blog/best-cybersecurity-certifications/</guid><description>Learn about the best cybersecurity certifications you can find on the market to kickstart or advance your career in the field. 
</description><pubDate>Mon, 01 Jul 2024 18:08:25 GMT</pubDate></item><item><title>OffSec’s User-Generated Content</title><link>https://www.offsec.com/blog/ugc-program/</link><guid isPermaLink="true">https://www.offsec.com/blog/ugc-program/</guid><description>Learn about OffSec&amp;#8217;s UGC program. Submit your machines, earn bounties, and be part of a global community. </description><pubDate>Mon, 01 Jul 2024 13:05:51 GMT</pubDate></item><item><title>What are the most common cyber threats in healthcare?</title><link>https://www.offsec.com/blog/healthcare-cyber-threats/</link><guid isPermaLink="true">https://www.offsec.com/blog/healthcare-cyber-threats/</guid><description>Learn about the most common cyber threats for the healthcare industry as well as the largest data breaches. </description><pubDate>Fri, 28 Jun 2024 16:39:19 GMT</pubDate></item><item><title>Launching New Vulnerable Machines in OCR</title><link>https://www.offsec.com/blog/new-ocr-machines/</link><guid isPermaLink="true">https://www.offsec.com/blog/new-ocr-machines/</guid><description>Learn about the new vulnerable machines we have added to OCR. 
</description><pubDate>Thu, 27 Jun 2024 16:01:39 GMT</pubDate></item><item><title>Kickstart Your Cybersecurity Career with OffSec’s SEC-100: CyberCore – Security Essentials</title><link>https://www.offsec.com/blog/introducing-sec-100-cybercore/</link><guid isPermaLink="true">https://www.offsec.com/blog/introducing-sec-100-cybercore/</guid><description>We&amp;#8217;re thrilled to announce the immediate availability of our new course and certification SEC-100: CyberCore &amp;#8211; Security Essentials! 
</description><pubDate>Mon, 24 Jun 2024 15:02:57 GMT</pubDate></item><item><title>Elevating Your Learning Experience: OffSec’s Latest Updates</title><link>https://www.offsec.com/blog/elevating-your-learning-experience/</link><guid isPermaLink="true">https://www.offsec.com/blog/elevating-your-learning-experience/</guid><description>Learn about the latest updates from OffSec &amp;#8211; from new learner dashboard, to skill pins and custom learning &amp;#8211; find all of the details here! </description><pubDate>Thu, 20 Jun 2024 12:21:03 GMT</pubDate></item><item><title>How OffSec is Leveraging AI to Enrich Your Learner Journey</title><link>https://www.offsec.com/blog/leveraging-ai-at-offsec/</link><guid isPermaLink="true">https://www.offsec.com/blog/leveraging-ai-at-offsec/</guid><description>We are thrilled to introduce a range of new features that utilize Artificial Intelligence to transform the cybersecurity learning landscape. </description><pubDate>Wed, 05 Jun 2024 15:35:37 GMT</pubDate></item><item><title>Emotional Intelligence in Cybersecurity</title><link>https://www.offsec.com/blog/emotional-intelligence-in-cybersecurity/</link><guid isPermaLink="true">https://www.offsec.com/blog/emotional-intelligence-in-cybersecurity/</guid><description>Discover the importance of emotional intelligence in cybersecurity and learn to navigate emotions for enhanced security protocols.</description><pubDate>Thu, 30 May 2024 13:58:06 GMT</pubDate></item><item><title>Infrastructure Hardening and Proactive Defense: The System Administrator’s Toolkit</title><link>https://www.offsec.com/blog/infrastructure-hardening-and-proactive-defense-the-system-administrators-toolkit/</link><guid isPermaLink="true">https://www.offsec.com/blog/infrastructure-hardening-and-proactive-defense-the-system-administrators-toolkit/</guid><description>Secure your Unix, Windows, &amp;#038; Web environments. OffSec&amp;#8217;s hands-on training empowers system admins to combat cyber threats. </description><pubDate>Tue, 14 May 2024 14:12:27 GMT</pubDate></item><item><title>Cybersecurity Training and Cyber Insurance: Bridging the Gap with Continuous Improvement</title><link>https://www.offsec.com/blog/cybersecurity-training-and-cyber-insurance/</link><guid isPermaLink="true">https://www.offsec.com/blog/cybersecurity-training-and-cyber-insurance/</guid><description>Discover how crucial continuous and relevant training is for avoiding cyber threats and lowering cyber insurance premiums. </description><pubDate>Thu, 09 May 2024 18:56:36 GMT</pubDate></item><item><title>Continuing to support cybersecurity teams with Award winning &amp; innovative training in April</title><link>https://www.offsec.com/blog/award-winning-april/</link><guid isPermaLink="true">https://www.offsec.com/blog/award-winning-april/</guid><description>Announcing new award willing continuous learning opportunities for cybersecurity professionals from OffSec.</description><pubDate>Mon, 06 May 2024 16:04:04 GMT</pubDate></item><item><title>AMSI Write Raid Bypass Vulnerability</title><link>https://www.offsec.com/blog/amsi-write-raid-0day-vulnerability/</link><guid isPermaLink="true">https://www.offsec.com/blog/amsi-write-raid-0day-vulnerability/</guid><description>In this blog post, we&amp;#8217;ll introduce a new bypass technique designed to bypass AMSI without the VirtualProtect API and without changing memory protection.</description><pubDate>Fri, 03 May 2024 19:38:33 GMT</pubDate></item><item><title>How Cybersecurity Training Lowers Insurance Premiums</title><link>https://www.offsec.com/blog/how-cybersecurity-training-lowers-insurance-premiums/</link><guid isPermaLink="true">https://www.offsec.com/blog/how-cybersecurity-training-lowers-insurance-premiums/</guid><description>Discover the essential cybersecurity training elements that insurers look for and how to build a winning program.</description><pubDate>Wed, 01 May 2024 21:13:38 GMT</pubDate></item><item><title>Infrastructure Automation and Defense: Introducing DevSecOps Essentials</title><link>https://www.offsec.com/blog/infrastructure-automation-and-defense-introducing-devsecops-essentials/</link><guid isPermaLink="true">https://www.offsec.com/blog/infrastructure-automation-and-defense-introducing-devsecops-essentials/</guid><description>Accelerate your DevOps journey with OffSec. Build secure, scalable, and efficient software delivery pipelines through real-world training.</description><pubDate>Tue, 23 Apr 2024 13:40:09 GMT</pubDate></item><item><title>The Role of Cybersecurity Training in Compliance</title><link>https://www.offsec.com/blog/the-role-of-cybersecurity-training-in-compliance/</link><guid isPermaLink="true">https://www.offsec.com/blog/the-role-of-cybersecurity-training-in-compliance/</guid><description>Learn about the role of cybersecurity training in compliance. Discover how OffSec’s training can contribute to a strong compliance posture. </description><pubDate>Mon, 22 Apr 2024 14:01:11 GMT</pubDate></item><item><title>What is Cybersecurity Compliance? The Ultimate Guide</title><link>https://www.offsec.com/blog/cybersecurity-compliance-regulatory-frameworks/</link><guid isPermaLink="true">https://www.offsec.com/blog/cybersecurity-compliance-regulatory-frameworks/</guid><description> Learn about the importance of cybersecurity compliance, the most common cybersecurity compliance frameworks and how to ensure your organization is compliant. </description><pubDate>Tue, 16 Apr 2024 16:30:45 GMT</pubDate></item><item><title>Proactive Threat Detection: Introducing Threat Hunting Essentials</title><link>https://www.offsec.com/blog/threat-hunting-essentials/</link><guid isPermaLink="true">https://www.offsec.com/blog/threat-hunting-essentials/</guid><description>Outsmart evolving cyber threats with Threat Hunting Essentials. This hands-on training path builds expertise in threat actor analysis, advanced hunting techniques, and data analysis.</description><pubDate>Tue, 16 Apr 2024 16:18:18 GMT</pubDate></item><item><title>The Race Against the Hackers: How the OffSec Cyber Ranges Keep You Ahead</title><link>https://www.offsec.com/blog/cyber-range-xz/</link><guid isPermaLink="true">https://www.offsec.com/blog/cyber-range-xz/</guid><description>Stay ahead of hackers! OffSec Cyber Ranges train your team on the latest exploits for a proactive, adaptable defense.</description><pubDate>Mon, 15 Apr 2024 18:52:48 GMT</pubDate></item><item><title>Communication Skills in Cybersecurity</title><link>https://www.offsec.com/blog/communication-skills-in-cybersecurity/</link><guid isPermaLink="true">https://www.offsec.com/blog/communication-skills-in-cybersecurity/</guid><description>Learn about the importance of clear and effective communication skills in cybersecurity.</description><pubDate>Fri, 12 Apr 2024 17:09:58 GMT</pubDate></item><item><title>Behind Enemy Lines: Understanding the Threat of the XZ Backdoor</title><link>https://www.offsec.com/blog/xz-backdoor/</link><guid isPermaLink="true">https://www.offsec.com/blog/xz-backdoor/</guid><description>The following is an excerpt from our new module on the recent XZ Utils backdoor, CVE-2024-3094. &amp;nbsp; On Mar 29, 2024, at 12:00PM ET, Andres Freund posted on the Openwall mailing list about a backdoor he discovered in the XZ Utils package. The backdoor targeted the OpenSSH binary, allowing remote code execution on impacted machines.</description><pubDate>Tue, 09 Apr 2024 17:05:45 GMT</pubDate></item><item><title>OffSec Versus: Revolutionizing Cybersecurity Training Through Live-Fire Collaboration</title><link>https://www.offsec.com/blog/offsec-versus-revolutionizing-cybersecurity-training-through-live-fire-collaboration/</link><guid isPermaLink="true">https://www.offsec.com/blog/offsec-versus-revolutionizing-cybersecurity-training-through-live-fire-collaboration/</guid><description>Did you know that 95% of cybersecurity breaches are caused by human error? Traditional training methods often fail to address this critical factor, leaving organizations exposed. OffSec Versus, part of the Enterprise Cyber Range, is designed to change that. It&amp;#8217;s a live-fire training environment where your Red and Blue teams learn by doing, battling head-to-head,</description><pubDate>Tue, 09 Apr 2024 16:21:10 GMT</pubDate></item><item><title>Soft Skills for Cybersecurity Leaders: CISO’s Perspective</title><link>https://www.offsec.com/blog/soft-skills-for-cyber-leaders/</link><guid isPermaLink="true">https://www.offsec.com/blog/soft-skills-for-cyber-leaders/</guid><description>The emphasis on technical skills and knowledge in cybersecurity has always been present. However, as the field becomes increasingly complex and intertwined with every facet of business operations, the spotlight has shifted to the indispensable role soft skills hold in cybersecurity leadership.  This perspective was the focal point of our recent webinar, led by Thereasa</description><pubDate>Wed, 03 Apr 2024 16:40:21 GMT</pubDate></item><item><title>Transform Your Cybersecurity Training with OffSec’s Cyber Ranges</title><link>https://www.offsec.com/blog/transform-your-cybersecurity-training-with-offsecs-cyber-ranges/</link><guid isPermaLink="true">https://www.offsec.com/blog/transform-your-cybersecurity-training-with-offsecs-cyber-ranges/</guid><description>In 2024, the cybersecurity landscape is bleak, with 62% of organizations acknowledging a pressing need for enhanced cybersecurity skills amidst growing digital threats. This statistic underscores the urgent demand for comprehensive training in modern cybersecurity practices​. In response to this critical need, OffSec is introducing a new suite of Cyber Ranges.  OffSec&amp;#8217;s Cyber Ranges –</description><pubDate>Mon, 01 Apr 2024 17:56:02 GMT</pubDate></item><item><title>Importance of report writing for pen testers</title><link>https://www.offsec.com/blog/importance-of-report-writing-for-pen-testers/</link><guid isPermaLink="true">https://www.offsec.com/blog/importance-of-report-writing-for-pen-testers/</guid><description>Pentesters are well known for their technical skill sets, they simulate cyber attacks on computer systems, networks, or applications in a controlled environment. And, their primary goal is to identify vulnerabilities and weaknesses to assess the security posture of a target system. Much of the work they do is technical in nature, but in order</description><pubDate>Mon, 01 Apr 2024 14:22:28 GMT</pubDate></item><item><title>The Cybersecurity Skills Gap: Time to Step Up with OffSec’s Red Teaming and IoT Learning Paths</title><link>https://www.offsec.com/blog/red-team-iot-learning-paths/</link><guid isPermaLink="true">https://www.offsec.com/blog/red-team-iot-learning-paths/</guid><description>The cybersecurity landscape is indeed challenged by a significant skills gap, with reports highlighting the critical shortage of professionals equipped to handle escalating cyber threats. The 2023 Global Cybersecurity Skills Gap Report from Fortinet underscores the urgency of this issue, revealing that a vast majority of organizations are facing more breaches due to a lack</description><pubDate>Tue, 26 Mar 2024 17:08:16 GMT</pubDate></item><item><title>Starting 2024 strong – The largest launch of security training from OffSec</title><link>https://www.offsec.com/blog/the-largest-security-training-launch-from-offsec/</link><guid isPermaLink="true">https://www.offsec.com/blog/the-largest-security-training-launch-from-offsec/</guid><description>Strong cybersecurity relies on an understanding of the importance of security throughout the entire organization. OffSec is committed to delivering security training to offensive, defensive, development and IT teams that can best protect organizations. In the first 10 weeks of 2024, we’ve released new learning paths to support more security training across the organization. No</description><pubDate>Thu, 14 Mar 2024 15:11:34 GMT</pubDate></item><item><title>Cloud security training: Build secure cloud systems</title><link>https://www.offsec.com/blog/new-cloud-learning-paths/</link><guid isPermaLink="true">https://www.offsec.com/blog/new-cloud-learning-paths/</guid><description>The cloud&amp;#8217;s potential is undeniable – but securing it remains a daunting challenge. A recent SC Magazine survey revealed a troubling statistic: one in four companies cite a critical cloud security skills gap. This gap leaves organizations vulnerable, as attackers exploit everything from exposed cloud storage buckets to vulnerabilities in development pipelines. Generic tutorials and</description><pubDate>Tue, 12 Mar 2024 13:44:33 GMT</pubDate></item><item><title>Cybersecurity training aligned with the MITRE ATT&amp;CK framework</title><link>https://www.offsec.com/blog/mitre-attack-training/</link><guid isPermaLink="true">https://www.offsec.com/blog/mitre-attack-training/</guid><description>The MITRE ATT&amp;amp;CK framework was developed in 2013 as a knowledge base of adversary tactics and techniques based on real-world observations. The ATT&amp;amp;CK knowledge base is a foundation for specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. This MITRE ATT&amp;amp;CK Enterprise framework is used by many of</description><pubDate>Tue, 12 Mar 2024 13:11:22 GMT</pubDate></item><item><title>The Essential Soft Skills for Cybersecurity Leaders</title><link>https://www.offsec.com/blog/soft-skills-for-cybersecurity-leaders/</link><guid isPermaLink="true">https://www.offsec.com/blog/soft-skills-for-cybersecurity-leaders/</guid><description>Learn about the essential role of soft skills in enhancing the effectiveness and resilience of cybersecurity leaders amidst evolving cyber threats.</description><pubDate>Tue, 05 Mar 2024 17:57:48 GMT</pubDate></item><item><title>How Is AI Used in Cybersecurity?</title><link>https://www.offsec.com/blog/ai-in-cybersecurity/</link><guid isPermaLink="true">https://www.offsec.com/blog/ai-in-cybersecurity/</guid><description>Learn how AI is used in cybersecurity for threat detection, security operations, and defense. Explore generative AI risks and practical integration steps.</description><pubDate>Mon, 26 Feb 2024 15:10:13 GMT</pubDate></item><item><title>Secure Coding – A critical skill in today’s threat landscape</title><link>https://www.offsec.com/blog/new-secure-coding-learning-paths/</link><guid isPermaLink="true">https://www.offsec.com/blog/new-secure-coding-learning-paths/</guid><description>Upgrade your secure coding skills with OffSec&amp;#8217;s new Learning Paths!  Master critical concepts and build resilient applications.</description><pubDate>Thu, 22 Feb 2024 16:31:26 GMT</pubDate></item><item><title>Beyond the Keyboard: “Try Harder” Mindset and Goals</title><link>https://www.offsec.com/blog/beyond-the-keyboard-try-harder-mindset-and-goals/</link><guid isPermaLink="true">https://www.offsec.com/blog/beyond-the-keyboard-try-harder-mindset-and-goals/</guid><description>Read a post written by Shanks, the winner of our discord blog writing challenge and hear about their journey of earning the OSCP. </description><pubDate>Fri, 16 Feb 2024 16:11:32 GMT</pubDate></item><item><title>The Essential Guide to Incident Response and Cyber Resilience</title><link>https://www.offsec.com/blog/incident-responder-essentials/</link><guid isPermaLink="true">https://www.offsec.com/blog/incident-responder-essentials/</guid><description>Guide on cyber incident response: skills, frameworks, real-world examples, and the OffSec advantage for building cyber resilience.</description><pubDate>Tue, 06 Feb 2024 17:12:22 GMT</pubDate></item><item><title>What InfoSec Leaders Need to Know About AI</title><link>https://www.offsec.com/blog/what-infosec-leaders-need-to-know-about-ai/</link><guid isPermaLink="true">https://www.offsec.com/blog/what-infosec-leaders-need-to-know-about-ai/</guid><description>2024 sees AI reshaping cybersecurity. Leaders must grasp AI integration, secure tools, tackle emerging threats, and foster a culture of proactive, informed security.</description><pubDate>Tue, 30 Jan 2024 16:27:43 GMT</pubDate></item><item><title>Deepen Your Security Acumen with OffSec’s OWASP Top 10:2021 Learning Path</title><link>https://www.offsec.com/blog/owasp-top-10-2021-learning-path-blog-post/</link><guid isPermaLink="true">https://www.offsec.com/blog/owasp-top-10-2021-learning-path-blog-post/</guid><description>OffSec&amp;#8217;s OWASP Top 10: 2021 Learning Path is an exploration of common vulnerabilities from the perspectives of the business, attackers, and defenders</description><pubDate>Tue, 16 Jan 2024 18:01:37 GMT</pubDate></item><item><title>Top cyberthreats for 2024</title><link>https://www.offsec.com/blog/top-cyberthreats-2024/</link><guid isPermaLink="true">https://www.offsec.com/blog/top-cyberthreats-2024/</guid><description>Explore OffSec’s predictions for the top cybersecurity threats that will shape the threat landscape in 2024. </description><pubDate>Fri, 12 Jan 2024 20:34:50 GMT</pubDate></item><item><title>OffSec’s 2023: A year of holistic cybersecurity education and strategic growth</title><link>https://www.offsec.com/blog/offsec-recap-2023/</link><guid isPermaLink="true">https://www.offsec.com/blog/offsec-recap-2023/</guid><description>Explore OffSec&amp;#8217;s transformative 2023 journey in cybersecurity education and strategic growth, highlighted by a brand refresh, extensive content updates, the launch of Learn Enterprise and the OffSec Cyber Range, and significant enhancements to Kali Linux. </description><pubDate>Mon, 18 Dec 2023 18:21:50 GMT</pubDate></item><item><title>Ransomware Revealed: From Attack Mechanics to Defense Strategies</title><link>https://www.offsec.com/blog/ransomware-attacks/</link><guid isPermaLink="true">https://www.offsec.com/blog/ransomware-attacks/</guid><description>Explore the evolution of ransomware attacks, their impact, types, and learn robust defense strategies against this escalating cyber threat.</description><pubDate>Fri, 15 Dec 2023 17:11:51 GMT</pubDate></item><item><title>Social Engineering: The Art of Human Hacking</title><link>https://www.offsec.com/blog/social-engineering/</link><guid isPermaLink="true">https://www.offsec.com/blog/social-engineering/</guid><description>Learn how social engineering exploits human vulnerabilities through manipulation and deception. This guide covers different tactics cybercriminals use and key strategies to protect your organization.</description><pubDate>Fri, 08 Dec 2023 17:57:57 GMT</pubDate></item><item><title>Navigating the Complexities of Red Team and Blue Team Cybersecurity Collaboration</title><link>https://www.offsec.com/blog/red-team-blue-team-cybersecurity-collaboration/</link><guid isPermaLink="true">https://www.offsec.com/blog/red-team-blue-team-cybersecurity-collaboration/</guid><description>Learn about how to navigate the complexities of red team and blue team cybersecurity collaboration.</description><pubDate>Thu, 30 Nov 2023 16:57:41 GMT</pubDate></item><item><title>Advanced Persistent Threats: OffSec’s Comprehensive Guide</title><link>https://www.offsec.com/blog/advanced-persistent-threats/</link><guid isPermaLink="true">https://www.offsec.com/blog/advanced-persistent-threats/</guid><description>Explore key strategies to safeguard against Advanced Persistent Threats (APTs), focusing on prevention, response, and recovery in cybersecurity.</description><pubDate>Tue, 28 Nov 2023 15:41:03 GMT</pubDate></item><item><title>Put Your Skills to the Test in OffSec’s 2023 EOY CTF</title><link>https://www.offsec.com/blog/2023-eoy-ctf/</link><guid isPermaLink="true">https://www.offsec.com/blog/2023-eoy-ctf/</guid><description>We invite PG Practice subscribers to join our EOY CTF tournament! Learn more about the competition, how to participate, and prizes.</description><pubDate>Tue, 14 Nov 2023 15:48:21 GMT</pubDate></item><item><title>Build Your Cybersecurity Career Path with Learn One</title><link>https://www.offsec.com/blog/learn-one-2023/</link><guid isPermaLink="true">https://www.offsec.com/blog/learn-one-2023/</guid><description>Learn One offers flexibility and everything you need to earn a cert and build your cybersecurity career. Discover more about this value-packed subscription. </description><pubDate>Wed, 08 Nov 2023 17:11:46 GMT</pubDate></item><item><title>Elevating the standard for cybersecurity education</title><link>https://www.offsec.com/blog/continuous-learning-cycle/</link><guid isPermaLink="true">https://www.offsec.com/blog/continuous-learning-cycle/</guid><description>Learn about OffSec&amp;#8217;s unique approach to cybersecurity education. Better understand a comprehensive learning ecosystem that emphasizes a continuous cycle of learning, from hands-on offensive techniques to defensive strategies, and join a community dedicated to real-world cybersecurity excellence. </description><pubDate>Mon, 06 Nov 2023 19:38:00 GMT</pubDate></item><item><title>Mentorship Programs: A Crucial Element in Retaining Cybersecurity Talent</title><link>https://www.offsec.com/blog/mentorship-programs-for-retention-of-cybersecurity-talent/</link><guid isPermaLink="true">https://www.offsec.com/blog/mentorship-programs-for-retention-of-cybersecurity-talent/</guid><description>Discover how mentorship programs can aid cybersecurity skills development and retention of cybersecurity talent. </description><pubDate>Thu, 26 Oct 2023 18:17:49 GMT</pubDate></item><item><title>How to Build Elite Technical Teams Internally with Cybersecurity Training</title><link>https://www.offsec.com/blog/upskill-teams-with-cybersecurity-training/</link><guid isPermaLink="true">https://www.offsec.com/blog/upskill-teams-with-cybersecurity-training/</guid><description>Learn about strategies and best practices for upskilling and promoting internal technical team members with OffSec’s cybersecurity training.</description><pubDate>Wed, 18 Oct 2023 14:18:55 GMT</pubDate></item><item><title>SOC-200 OSDA Review — Offensive Security Defense Analyst</title><link>https://www.offsec.com/blog/soc-200-osda-review/</link><guid isPermaLink="true">https://www.offsec.com/blog/soc-200-osda-review/</guid><description>Read a review of SOC-200 (OSDA), OffSec&amp;#8217;s defensive cybersecurity course and certification designed for job roles such as SOC Analysts and Threat Hunters.</description><pubDate>Thu, 05 Oct 2023 16:25:48 GMT</pubDate></item><item><title>The Role of Continuous Learning in Retaining Cybersecurity Experts</title><link>https://www.offsec.com/blog/retaining-cybersecurity-experts/</link><guid isPermaLink="true">https://www.offsec.com/blog/retaining-cybersecurity-experts/</guid><description>Delve into the vital role continuous learning has in retaining cybersecurity experts and explore how ongoing education and professional development programs can play a critical role.</description><pubDate>Tue, 03 Oct 2023 13:43:54 GMT</pubDate></item><item><title>OffSec Cyber Range Blue Webinar Recap</title><link>https://www.offsec.com/blog/cyber-range-blue-webinar-blog/</link><guid isPermaLink="true">https://www.offsec.com/blog/cyber-range-blue-webinar-blog/</guid><description>Recap of OffSec&amp;#8217;s recent webinar on the Cyber Range platform, highlighting its alignment with CISO priorities and benefits for cybersecurity professionals. Discover how it bridges organizational strategy with hands-on training.</description><pubDate>Tue, 26 Sep 2023 17:57:02 GMT</pubDate></item><item><title>The Future of Cybersecurity: Insights from Forrester’s Latest Report</title><link>https://www.offsec.com/blog/forrester-cybersecurity-skills-and-training-platforms-landscape/</link><guid isPermaLink="true">https://www.offsec.com/blog/forrester-cybersecurity-skills-and-training-platforms-landscape/</guid><description>OffSec delves into Forrester&amp;#8217;s latest report on Cybersecurity Skills &amp;#038; Training, highlighting pivotal insights that align with our vision for a fortified future in cybersecurity.</description><pubDate>Mon, 25 Sep 2023 19:58:28 GMT</pubDate></item><item><title>5 ways to leverage AI and ML for cybersecurity defense</title><link>https://www.offsec.com/blog/ai-ml-for-cybersecurity-defense/</link><guid isPermaLink="true">https://www.offsec.com/blog/ai-ml-for-cybersecurity-defense/</guid><description>Learn about the five ways businesses can harness artificial intelligence (AI) and machine learning (ML) to fortify their cyber defense. </description><pubDate>Fri, 22 Sep 2023 18:44:37 GMT</pubDate></item><item><title>Emerging threats: Adapting cyber defense to the changing landscape</title><link>https://www.offsec.com/blog/emerging-cyber-threats-2023/</link><guid isPermaLink="true">https://www.offsec.com/blog/emerging-cyber-threats-2023/</guid><description>As we step further into 2023, the digital world presents us with new cybersecurity challenges that can&amp;#8217;t be ignored. Ransomware continues to evolve with smarter tactics. Cloud security, once deemed robust, faces fresh vulnerabilities as more businesses transition online. And then there&amp;#8217;s 5G—its rapid adoption brings along a slew of concerns, making our defensive teams</description><pubDate>Fri, 08 Sep 2023 14:22:46 GMT</pubDate></item><item><title>Intro To Honeypots</title><link>https://www.offsec.com/blog/intro-to-honeypots/</link><guid isPermaLink="true">https://www.offsec.com/blog/intro-to-honeypots/</guid><description>Honeypots remain a relatively unexplored concept beyond the realms of security research organizations. This is largely due to the stigma where these types of systems are typically observed as being exploitable, therefore introducing unnecessary risk. This fear of the unknown results in lost opportunities for defenders by avoiding the topic altogether. We will help eliminate</description><pubDate>Wed, 06 Sep 2023 18:22:37 GMT</pubDate></item><item><title>The Power of Threat Intelligence in Cyber Defense</title><link>https://www.offsec.com/blog/threat-intelligence-in-cyber-defense/</link><guid isPermaLink="true">https://www.offsec.com/blog/threat-intelligence-in-cyber-defense/</guid><description>Enter the realm of threat intelligence, a proactive measure that offers a critical advantage to cybersecurity defense teams. </description><pubDate>Thu, 31 Aug 2023 14:40:49 GMT</pubDate></item><item><title>A Deep Dive into OffSec Cyber Range</title><link>https://www.offsec.com/blog/offsec-cyber-range-deep-dive/</link><guid isPermaLink="true">https://www.offsec.com/blog/offsec-cyber-range-deep-dive/</guid><description>Discover how OffSec harnesses the power of cyber ranges for unparalleled training and simulation. Delve into the world where hands-on experience meets cutting-edge techniques, ensuring professionals are equipped to tackle the ever-evolving cybersecurity challenges.</description><pubDate>Wed, 30 Aug 2023 16:39:49 GMT</pubDate></item><item><title>Strengthening Your Cybersecurity: The Power of the Three P’s and Team Training</title><link>https://www.offsec.com/blog/the-power-of-three-ps-in-cybersecurity/</link><guid isPermaLink="true">https://www.offsec.com/blog/the-power-of-three-ps-in-cybersecurity/</guid><description>Delve into the significance of training for cybersecurity teams in mastering the three P’s of cybersecurity: People, Processes and Products.  </description><pubDate>Thu, 24 Aug 2023 14:26:28 GMT</pubDate></item><item><title>Why Cyber Range Platforms Matter</title><link>https://www.offsec.com/blog/why-cyber-range-platforms-matter/</link><guid isPermaLink="true">https://www.offsec.com/blog/why-cyber-range-platforms-matter/</guid><description>Learn why cyber range platforms matter, their key benefits, and how they boost hands-on cybersecurity training for security teams.</description><pubDate>Fri, 18 Aug 2023 17:20:32 GMT</pubDate></item><item><title>Metrics to Enhance your Cybersecurity Skills Development Program</title><link>https://www.offsec.com/blog/cybersecurity-learning-metrics-cheatsheet/</link><guid isPermaLink="true">https://www.offsec.com/blog/cybersecurity-learning-metrics-cheatsheet/</guid><description>How can you know if you are getting the most value out of cybersecurity learning? Metrics. Here is a short guide to four types of essential cybersecurity learning metrics. </description><pubDate>Tue, 15 Aug 2023 19:37:03 GMT</pubDate></item><item><title>Empowering the Cybersecurity Workforce:  OffSec and Climb Channel Solutions Join Forces</title><link>https://www.offsec.com/blog/climb-partnership-announcement/</link><guid isPermaLink="true">https://www.offsec.com/blog/climb-partnership-announcement/</guid><description>OffSec&amp;#8217;s partnership with Climb Channel Solutions heralds an exciting era of cybersecurity training. Learn about how our alliance will build the path to a more secure future.</description><pubDate>Tue, 15 Aug 2023 14:37:57 GMT</pubDate></item><item><title>OffSec’s Capture the Flag Tournament (CTF)</title><link>https://www.offsec.com/blog/ctf/</link><guid isPermaLink="true">https://www.offsec.com/blog/ctf/</guid><description>We invite PG Practice subscribers to join our OffSec CTF tournament! Learn more about the competition, how to participate, and prizes.</description><pubDate>Mon, 14 Aug 2023 20:09:14 GMT</pubDate></item><item><title>Q2 2023, Community Updates: Introducing New Learning Assets, a Unique Solution for Workforce Development, and Capture the Flag (CTF)</title><link>https://www.offsec.com/blog/q2-23-community-update/</link><guid isPermaLink="true">https://www.offsec.com/blog/q2-23-community-update/</guid><description>Dive into OffSec’s community update for Q2 2023, where we discuss new content, Learn Enterprise, and our CTF event. </description><pubDate>Wed, 09 Aug 2023 13:39:49 GMT</pubDate></item><item><title>Top 3 CISO concerns for 2023</title><link>https://www.offsec.com/blog/top-ciso-concerns-for-2023/</link><guid isPermaLink="true">https://www.offsec.com/blog/top-ciso-concerns-for-2023/</guid><description>As the cybersecurity landscape rapidly transforms, CISOs, and security leaders face an array of challenges while striving to protect their organizations from the ever-present cyber threats. Recently, at an event we hosted, &amp;#8220;Sippin with OffSec,&amp;#8221; prominent security professionals gathered to discuss various topics, and three critical themes emerged as top concerns for CISOs in 2023. </description><pubDate>Thu, 03 Aug 2023 14:11:58 GMT</pubDate></item><item><title>Essential Types of Metrics to Boost Support for Your Cybersecurity Learning Program – Part 2</title><link>https://www.offsec.com/blog/cybersecurity-learning-metrics-part-2/</link><guid isPermaLink="true">https://www.offsec.com/blog/cybersecurity-learning-metrics-part-2/</guid><description>Second part in the series where we go through the four essential metrics you should be tracking to boost support for your cybersecurity learning program. </description><pubDate>Mon, 31 Jul 2023 17:14:50 GMT</pubDate></item><item><title>Essential Metrics to Boost Support for Your Cybersecurity Learning Program – Part 1</title><link>https://www.offsec.com/blog/cybersecurity-learning-metrics/</link><guid isPermaLink="true">https://www.offsec.com/blog/cybersecurity-learning-metrics/</guid><description>Discover the four organizational and individual metrics you should be tracking to boost support for your cybersecurity learning program. </description><pubDate>Tue, 25 Jul 2023 17:11:30 GMT</pubDate></item><item><title>Live Training: Dallas, TX, USA</title><link>https://www.offsec.com/blog/live-training-dallas-tx-usa/</link><guid isPermaLink="true">https://www.offsec.com/blog/live-training-dallas-tx-usa/</guid><description>September 11-15 2023</description><pubDate>Sat, 08 Jul 2023 17:25:11 GMT</pubDate></item><item><title>An Overview of OffSec’s OSCE³ Certification: The Ultimate Achievement in Offensive Security</title><link>https://www.offsec.com/blog/osce3-certification/</link><guid isPermaLink="true">https://www.offsec.com/blog/osce3-certification/</guid><description>The OSCE³ certification demonstrates mastery of offensive security skills and techniques. Here&amp;#8217;s an overview of each course and the benefits of achieving the OSCE³ certification.</description><pubDate>Wed, 21 Jun 2023 14:32:25 GMT</pubDate></item><item><title>Join Our #BetheResource – Torches Challenge 2023</title><link>https://www.offsec.com/blog/be-the-resource-challenge/</link><guid isPermaLink="true">https://www.offsec.com/blog/be-the-resource-challenge/</guid><description>In our Be the Resource Challenge, Tristram writes about being a torch &amp;#8211; someone who helps guide others. Read on to discover more about his Torches Challenge.</description><pubDate>Tue, 20 Jun 2023 13:41:41 GMT</pubDate></item><item><title>4 Essential Strategies For Enterprise Cybersecurity Workforce Development</title><link>https://www.offsec.com/blog/essential-strategies-for-cybersecurity-workforce-development/</link><guid isPermaLink="true">https://www.offsec.com/blog/essential-strategies-for-cybersecurity-workforce-development/</guid><description>In our most recent webinar, we were joined by Jeremiah Roe, Field CISO at Synack. Paul Griffin, OffSec’s Head of Customer Success led the conversation about the cybersecurity talent gap and how it continues to present significant challenges for organizations across industries. Some of the key statistics shared indicate that the shortage of skilled professionals</description><pubDate>Mon, 05 Jun 2023 13:28:02 GMT</pubDate></item><item><title>Expanding Our Global Partner Program</title><link>https://www.offsec.com/blog/new-partner-program/</link><guid isPermaLink="true">https://www.offsec.com/blog/new-partner-program/</guid><description>Discover more about OffSec&amp;#8217;s expanded Partner Program, including new partner types, an improved Partner Portal, and our new Rewards Program.</description><pubDate>Thu, 01 Jun 2023 13:25:31 GMT</pubDate></item><item><title>How OffSec’s Web Application Security Course Helps Technical Team Members Become Better Developers, Attackers, and Defenders</title><link>https://www.offsec.com/blog/web-app-security-course/</link><guid isPermaLink="true">https://www.offsec.com/blog/web-app-security-course/</guid><description>In this blog, learn about how OffSec’s web application security course helps team members become better developers, attackers, and defenders.</description><pubDate>Wed, 31 May 2023 19:13:30 GMT</pubDate></item><item><title>5 ways security leaders are using real-world exercises</title><link>https://www.offsec.com/blog/how-security-leaders-are-using-real-world-exercises/</link><guid isPermaLink="true">https://www.offsec.com/blog/how-security-leaders-are-using-real-world-exercises/</guid><description>Learn all about how modern security leaders are using to improve and upskill their security team and their capabilities.</description><pubDate>Thu, 18 May 2023 13:44:14 GMT</pubDate></item><item><title>Q1 2023 Community Updates: Brand Refresh, PEN-200 Updates, and Kali’s Tenth Anniversary</title><link>https://www.offsec.com/blog/q1-2023-update/</link><guid isPermaLink="true">https://www.offsec.com/blog/q1-2023-update/</guid><description>Welcome to OffSec&amp;#8217;s Q1 2023 community update! Dive into the details behind our brand refresh, the enhanced PEN-200, Kali Linux&amp;#8217;s 10th anniversary, and more. </description><pubDate>Fri, 21 Apr 2023 18:45:52 GMT</pubDate></item><item><title>New Solution: Learn Enterprise</title><link>https://www.offsec.com/blog/new-solution-learn-enterprise/</link><guid isPermaLink="true">https://www.offsec.com/blog/new-solution-learn-enterprise/</guid><description>Explore the enhancements we&amp;#8217;re made to PEN-200 (PWK) 2023, including restructured course content, expanded Learning Modules, &amp;#038; Challenge Labs.</description><pubDate>Tue, 18 Apr 2023 12:57:50 GMT</pubDate></item><item><title>PEN-200 (PWK): Updated for 2023</title><link>https://www.offsec.com/blog/pen-200-2023/</link><guid isPermaLink="true">https://www.offsec.com/blog/pen-200-2023/</guid><description>Explore the enhancements we&amp;#8217;re made to PEN-200 (PWK) 2023, including restructured course content, expanded Learning Modules, &amp;#038; Challenge Labs.</description><pubDate>Wed, 15 Mar 2023 14:24:57 GMT</pubDate></item><item><title>Experience the Refreshed OffSec</title><link>https://www.offsec.com/blog/experience-the-refreshed-offsec/</link><guid isPermaLink="true">https://www.offsec.com/blog/experience-the-refreshed-offsec/</guid><description>Build the path to a secure future with the refreshed OffSec! Dive into the details behind our ever-evolving learning library, new logo, and modernized name.</description><pubDate>Wed, 01 Mar 2023 14:49:04 GMT</pubDate></item><item><title>OffSec Yearly Recap 2022</title><link>https://www.offsec.com/blog/2022-recap/</link><guid isPermaLink="true">https://www.offsec.com/blog/2022-recap/</guid><description>A comprehensive OffSec yearly recap: revisit some of the highlights, wins and important cybersecurity training themes that guided us through 2022. </description><pubDate>Tue, 31 Jan 2023 17:05:14 GMT</pubDate></item><item><title>New 90-day Course and Cybersecurity Certification Exam Bundles</title><link>https://www.offsec.com/blog/course-cert-bundle/</link><guid isPermaLink="true">https://www.offsec.com/blog/course-cert-bundle/</guid><description>Accelerate your learning and earn an OffSec cybersecurity certification in just 90 days. Learn about the benefits of our 90-day course and cert bundles. </description><pubDate>Fri, 13 Jan 2023 13:28:36 GMT</pubDate></item><item><title>Q4 Community Updates: Bridging the Diversity Gap, New Payment Plans, and Industry Events</title><link>https://www.offsec.com/blog/q4-update/</link><guid isPermaLink="true">https://www.offsec.com/blog/q4-update/</guid><description>Wrapping up 2022 with OffSec&amp;#8217;s Q4 community update! Find details about our latest community efforts, payment plans, live training, and much more.</description><pubDate>Thu, 05 Jan 2023 17:30:44 GMT</pubDate></item><item><title>Exploit Database 2022 Update</title><link>https://www.offsec.com/blog/exploit-db-2022-update/</link><guid isPermaLink="true">https://www.offsec.com/blog/exploit-db-2022-update/</guid><description>We’re sharing some significant updates to Exploit Database, one of OffSec’s community projects.</description><pubDate>Thu, 10 Nov 2022 20:53:13 GMT</pubDate></item><item><title>Staged Payloads from Kali Linux | PT Phone Home – PHP</title><link>https://www.offsec.com/blog/staged-payloads-from-kali-linux/</link><guid isPermaLink="true">https://www.offsec.com/blog/staged-payloads-from-kali-linux/</guid><description>Tristram shows you how to host a PHP web page on Kali Linux and how you can use it to stage payloads that are hidden behind a wall of conditional access requirements.</description><pubDate>Fri, 04 Nov 2022 19:18:35 GMT</pubDate></item><item><title>See Yourself in Cyber with OffSec: Cloud Security</title><link>https://www.offsec.com/blog/see-yourself-in-cloud-security/</link><guid isPermaLink="true">https://www.offsec.com/blog/see-yourself-in-cloud-security/</guid><description>As part of Cybersecurity Awareness Month 2022, we share out insights on starting a career in cloud security, together with key skills, prerequisites, career outlook, and much more.</description><pubDate>Mon, 31 Oct 2022 17:23:18 GMT</pubDate></item><item><title>See Yourself in Cyber with OffSec: Web Application Security</title><link>https://www.offsec.com/blog/see-yourself-in-web-application-security/</link><guid isPermaLink="true">https://www.offsec.com/blog/see-yourself-in-web-application-security/</guid><description>As part of Cybersecurity Awareness Month 2022, we share a complete guide to starting a career in web application security with insight into career outlook, essential skills, and much more.</description><pubDate>Fri, 21 Oct 2022 17:29:38 GMT</pubDate></item><item><title>Q3 Community Update | OffSec Academy, New Content, Giving Program</title><link>https://www.offsec.com/blog/q3-update/</link><guid isPermaLink="true">https://www.offsec.com/blog/q3-update/</guid><description>Welcome to OffSec&amp;#8217;s Q3 community update! This post discusses the launch of our Giving Program, new content, OffSec Academy, and much more.</description><pubDate>Fri, 14 Oct 2022 19:18:19 GMT</pubDate></item><item><title>See Yourself in Cyber with OffSec: Security Operations</title><link>https://www.offsec.com/blog/see-yourself-in-security-operations/</link><guid isPermaLink="true">https://www.offsec.com/blog/see-yourself-in-security-operations/</guid><description>As part of Cybersecurity Awareness Month 2022, we share a complete guide to starting a career in security operations and defense.</description><pubDate>Wed, 12 Oct 2022 18:50:45 GMT</pubDate></item><item><title>See Yourself in Cyber with OffSec: Penetration Testing</title><link>https://www.offsec.com/blog/see-yourself-as-a-pentester/</link><guid isPermaLink="true">https://www.offsec.com/blog/see-yourself-as-a-pentester/</guid><description>As part of the Cybersecurity Awareness Month 2022, we share a complete guide to starting a career as a penetration tester. </description><pubDate>Tue, 04 Oct 2022 20:30:10 GMT</pubDate></item><item><title>In the Hunt for the macOS AutoLogin Setup Process</title><link>https://www.offsec.com/blog/in-the-hunt-for-the-macos-autologin-setup-process/</link><guid isPermaLink="true">https://www.offsec.com/blog/in-the-hunt-for-the-macos-autologin-setup-process/</guid><description>OffSec&amp;#8217;s Csaba Fitzl shares how he reverse-engineered the macOS auto-login process, including the walls he hit, and the times he resorted to trial-and-error approaches.</description><pubDate>Fri, 23 Sep 2022 14:18:00 GMT</pubDate></item><item><title>Staged Payloads from Kali Linux | PT Phone Home – DNS</title><link>https://www.offsec.com/blog/staged-payloads-from-kalki-linux-pt-phone-hone-dns/</link><guid isPermaLink="true">https://www.offsec.com/blog/staged-payloads-from-kalki-linux-pt-phone-hone-dns/</guid><description>In part one of this post, Tristram teaches you how to use TXT records to stage payloads that can be retrieved through DNS lookups.</description><pubDate>Thu, 15 Sep 2022 21:33:24 GMT</pubDate></item><item><title>The Importance of Skilled Security Practitioners: How Security Skillfulness Reflects on Your Security Posture</title><link>https://www.offsec.com/blog/improve-skillfullness-of-cybersecurity-practitioners/</link><guid isPermaLink="true">https://www.offsec.com/blog/improve-skillfullness-of-cybersecurity-practitioners/</guid><description>Read about how the skillfulness of your security practitioners can impact your overall cybersecurity program and posture.</description><pubDate>Mon, 12 Sep 2022 20:17:27 GMT</pubDate></item><item><title>Bypassing Intel CET with Counterfeit Objects</title><link>https://www.offsec.com/blog/bypassing-intel-cet-with-counterfeit-objects/</link><guid isPermaLink="true">https://www.offsec.com/blog/bypassing-intel-cet-with-counterfeit-objects/</guid><description>In this blog, we’ll briefly cover how CFI mitigations works, including CET, and how we can leverage COOP to effectively bypass Intel CET on the latest Windows releases.</description><pubDate>Thu, 25 Aug 2022 19:54:50 GMT</pubDate></item><item><title>Offensive Security Online Community BBQ Event</title><link>https://www.offsec.com/blog/offensive-security-online-community-bbq-event/</link><guid isPermaLink="true">https://www.offsec.com/blog/offensive-security-online-community-bbq-event/</guid><description>Join our OffSec bbq event for the chance to win some swag! Make your favorite bbq meal and share photos on Discord. Pic with the most yums will be the winner.</description><pubDate>Fri, 19 Aug 2022 16:23:23 GMT</pubDate></item><item><title>OSCP Bonus Points Update: Sunsetting PEN-200 Legacy Course Exercises and a New Way to Achieve Points!</title><link>https://www.offsec.com/blog/sunsetting-pen-200-legacy-topic-exercises/</link><guid isPermaLink="true">https://www.offsec.com/blog/sunsetting-pen-200-legacy-topic-exercises/</guid><description>Announcing changes to achieving OSCP Bonus Points and sunsetting of the PEN-200 legacy course exercises. </description><pubDate>Wed, 03 Aug 2022 15:57:37 GMT</pubDate></item><item><title>Introduction to Car Hacking: The CAN Bus</title><link>https://www.offsec.com/blog/introduction-to-car-hacking-the-can-bus/</link><guid isPermaLink="true">https://www.offsec.com/blog/introduction-to-car-hacking-the-can-bus/</guid><description>The CAN bus (Controller Area Network bus) is a central network that a vehicle communicates with its components. We can think of this in regard to the fact that the vehicle has many functions that operate via electrical signals. The car has door locks, a speedometer, a gas gauge, controls for the brakes, controls for the gas pedal, and many, MANY more.</description><pubDate>Mon, 01 Aug 2022 16:56:52 GMT</pubDate></item><item><title>11 Tips For Beefing Up Your Resume And Getting A Job In Cybersecurity</title><link>https://www.offsec.com/blog/prepare-your-resume-for-a-cybersecurity-job/</link><guid isPermaLink="true">https://www.offsec.com/blog/prepare-your-resume-for-a-cybersecurity-job/</guid><description>Learn how to prepare your resume in an effective and professional manner to land a cybersecurity job.</description><pubDate>Mon, 01 Aug 2022 16:27:28 GMT</pubDate></item><item><title>Quarterly Community Updates: Student Discounts, OffSec Live, Partner Program, &amp; Much More!</title><link>https://www.offsec.com/blog/q2-update/</link><guid isPermaLink="true">https://www.offsec.com/blog/q2-update/</guid><description>Welcome to our Q2 update! This post discusses the launch of student discounts, OffSec Live, our Partner Program, and much more. </description><pubDate>Mon, 18 Jul 2022 14:32:15 GMT</pubDate></item><item><title>Start Studying Security with SQLi</title><link>https://www.offsec.com/blog/start-studying-security-with-sqli/</link><guid isPermaLink="true">https://www.offsec.com/blog/start-studying-security-with-sqli/</guid><description>We previously explored how Cross-Site Scripting (XSS) makes for an excellent topic to understand the reach and impact of hacking. In this post, we&amp;#8217;ll improve on conceptual understanding and try to help non-technical folks understand one of the core issues of information security: the fundamental ambiguity of code and data.</description><pubDate>Tue, 12 Jul 2022 15:49:30 GMT</pubDate></item><item><title>Enhanced: Learn Fundamentals</title><link>https://www.offsec.com/blog/new-and-improved-learn-fundamentals/</link><guid isPermaLink="true">https://www.offsec.com/blog/new-and-improved-learn-fundamentals/</guid><description>We&amp;#8217;re excited to announce updates and new features to Learn Fundamentals that include new course Topics, badges and assessments, and much more! </description><pubDate>Fri, 08 Jul 2022 18:59:07 GMT</pubDate></item><item><title>Weaponizing and Abusing Hidden Functionalities Contained in Office Document Properties</title><link>https://www.offsec.com/blog/macro-weaponization/</link><guid isPermaLink="true">https://www.offsec.com/blog/macro-weaponization/</guid><description>TJ shows us how adversaries use macro weaponization techniques to abuse hidden functionalities contained in Office document properties.</description><pubDate>Thu, 30 Jun 2022 13:13:28 GMT</pubDate></item><item><title>The ever-evolving role of the CISO: Cybersecurity leadership skills needed in the future of work</title><link>https://www.offsec.com/blog/the-evolving-role-of-the-ciso/</link><guid isPermaLink="true">https://www.offsec.com/blog/the-evolving-role-of-the-ciso/</guid><description>Learn about the cybersecurity leadership skills modern CISOs will need to succeed in the future.</description><pubDate>Thu, 30 Jun 2022 13:11:48 GMT</pubDate></item><item><title>Offensive Security Welcomes Cybersecurity Bills Signed into Law</title><link>https://www.offsec.com/blog/offsec-welcomes-more-cybersecurity-bills/</link><guid isPermaLink="true">https://www.offsec.com/blog/offsec-welcomes-more-cybersecurity-bills/</guid><description>Offensive Security is proud to support the Federal Rotational Cyber Workforce Program Act and welcomes new cybersecurity bills signed into law. </description><pubDate>Wed, 29 Jun 2022 18:01:29 GMT</pubDate></item><item><title>Offensive Security Hails Passage of Several Cybersecurity Bills in Congress</title><link>https://www.offsec.com/blog/offsec-greets-cybersecurity-bills-in-congress/</link><guid isPermaLink="true">https://www.offsec.com/blog/offsec-greets-cybersecurity-bills-in-congress/</guid><description>Offensive Security welcomes passage of critical cybersecurity bills in Congress that will enhance America&amp;#8217;s cybersecurity posture.</description><pubDate>Thu, 16 Jun 2022 16:40:00 GMT</pubDate></item><item><title>Helping Educational Institutions Align to NCAE-C</title><link>https://www.offsec.com/blog/achieve-and-maintain-cae-c-designation/</link><guid isPermaLink="true">https://www.offsec.com/blog/achieve-and-maintain-cae-c-designation/</guid><description>Learn about how Offensive Security helps educational institutions align to the National Center of Academic Excellence (NCAE-C) requirements.
</description><pubDate>Thu, 16 Jun 2022 07:07:53 GMT</pubDate></item><item><title>Celebrate the Release of Our 100th PG-Practice Machine</title><link>https://www.offsec.com/blog/100th-pg-practice-machine/</link><guid isPermaLink="true">https://www.offsec.com/blog/100th-pg-practice-machine/</guid><description>We&amp;#8217;re celebrating the release of our 100th PG-Practice machine by showcasing the evolution of our labs since their inception.</description><pubDate>Thu, 09 Jun 2022 13:59:44 GMT</pubDate></item><item><title>OffSec Live: PEN-200!</title><link>https://www.offsec.com/blog/offsec-live/</link><guid isPermaLink="true">https://www.offsec.com/blog/offsec-live/</guid><description>OffSec Live: PEN-200 is a free streaming program that will facilitate interactive learning and preparedness for the OSCP. Join us on Twitch and Discord! </description><pubDate>Wed, 08 Jun 2022 11:45:27 GMT</pubDate></item><item><title>3 Ways to Attract Top Cybersecurity Talent to the Federal Government</title><link>https://www.offsec.com/blog/attracting-cybersecurity-talent-to-federal-government/</link><guid isPermaLink="true">https://www.offsec.com/blog/attracting-cybersecurity-talent-to-federal-government/</guid><description>Protect your org from cyber threats by investing in hands-on cybersecurity skills training. Learn about how you can get the most out of your training budget.</description><pubDate>Tue, 31 May 2022 14:58:38 GMT</pubDate></item><item><title>Join Our #BetheResource Challenge</title><link>https://www.offsec.com/blog/join-our-betheresource-challenge/</link><guid isPermaLink="true">https://www.offsec.com/blog/join-our-betheresource-challenge/</guid><description>Protect your org from cyber threats by investing in hands-on cybersecurity skills training. Learn about how you can get the most out of your training budget.</description><pubDate>Thu, 26 May 2022 08:10:33 GMT</pubDate></item><item><title>4 Tips to Implement Online Cybersecurity Training for Your Information Technology and Security Teams</title><link>https://www.offsec.com/blog/4-tips-to-implement-online-cybersecurity-training/</link><guid isPermaLink="true">https://www.offsec.com/blog/4-tips-to-implement-online-cybersecurity-training/</guid><description>Protect your org from cyber threats by investing in hands-on cybersecurity skills training. Learn about how you can get the most out of your training budget.</description><pubDate>Mon, 16 May 2022 12:55:59 GMT</pubDate></item><item><title>Hands-on Cybersecurity Skills Training on a Budget: Tips to Get the Most Out of Your Money</title><link>https://www.offsec.com/blog/cybersecurity-skills-training/</link><guid isPermaLink="true">https://www.offsec.com/blog/cybersecurity-skills-training/</guid><description>Protect your org from cyber threats by investing in hands-on cybersecurity skills training. Learn about how you can get the most out of your training budget.</description><pubDate>Mon, 02 May 2022 18:38:03 GMT</pubDate></item><item><title>What is XSS</title><link>https://www.offsec.com/blog/what-is-xss/</link><guid isPermaLink="true">https://www.offsec.com/blog/what-is-xss/</guid><description>OffSec&amp;#8217;s Jeremy Miller helps cybersecurity professionals explain hacking to laypeople using the Cross-site Scripting (XSS) vulnerability.</description><pubDate>Tue, 26 Apr 2022 00:00:00 GMT</pubDate></item><item><title>IRQLs Close Encounters of the Rootkit Kind</title><link>https://www.offsec.com/blog/irqls-close-encounters/</link><guid isPermaLink="true">https://www.offsec.com/blog/irqls-close-encounters/</guid><description>Content developer Matteo Malvica walks us through IRQLs and how hardware interrupts can be abused.</description><pubDate>Mon, 11 Apr 2022 11:19:03 GMT</pubDate></item><item><title>What the Pandemic Has Taught Us</title><link>https://www.offsec.com/blog/pandemic-lessons/</link><guid isPermaLink="true">https://www.offsec.com/blog/pandemic-lessons/</guid><description>OffSec&amp;#8217;s CEO Ning Wang shares five lessons she&amp;#8217;s learned from the pandemic. Lesson one &amp;#8211; people are more clear about the important things in life.

 </description><pubDate>Mon, 04 Apr 2022 10:28:15 GMT</pubDate></item><item><title>New Subscription: Learn Fundamentals</title><link>https://www.offsec.com/blog/entrylevel-cybersecurity-training/</link><guid isPermaLink="true">https://www.offsec.com/blog/entrylevel-cybersecurity-training/</guid><description>Learn Fundamentals is the newest addition to the OffSec Training Library! Discover more about this entry-level cybersecurity training plan.</description><pubDate>Wed, 30 Mar 2022 12:22:31 GMT</pubDate></item><item><title>Modernizing our Certificates and Badges</title><link>https://www.offsec.com/blog/digital-certs-badges/</link><guid isPermaLink="true">https://www.offsec.com/blog/digital-certs-badges/</guid><description>We&amp;#8217;re modernizing our certifications! Learn more about why we changed the issuance of accreditations from paper to digital certifications and badges. </description><pubDate>Tue, 22 Mar 2022 12:00:15 GMT</pubDate></item><item><title>Creating a Cybersecurity Talent Pool from Within Your Organization</title><link>https://www.offsec.com/blog/cybersecurity-talent-pool/</link><guid isPermaLink="true">https://www.offsec.com/blog/cybersecurity-talent-pool/</guid><description>A cybersecurity talent pool can fill critical positions in your organization. Learn how to identify and train employees that are interested in a career transition.</description><pubDate>Wed, 02 Mar 2022 11:00:17 GMT</pubDate></item><item><title>Introduction to Game Hacking</title><link>https://www.offsec.com/blog/game-hacking-intro/</link><guid isPermaLink="true">https://www.offsec.com/blog/game-hacking-intro/</guid><description>Explore our guided introduction to game hacking. Learn how data in memory can be manipulated to achieve results that are outside the normal program design.
</description><pubDate>Wed, 23 Feb 2022 13:00:09 GMT</pubDate></item><item><title>5 Tips: How to Get a Cybersecurity Job With No Experience</title><link>https://www.offsec.com/blog/cybersecurity-job-with-no-experience/</link><guid isPermaLink="true">https://www.offsec.com/blog/cybersecurity-job-with-no-experience/</guid><description>Land that entry-level cybersecurity position! We share five tips on how to get a cybersecurity job with no experience, with insight from two OffSec employees.</description><pubDate>Tue, 15 Feb 2022 12:00:51 GMT</pubDate></item><item><title>Goals for Your Cybersecurity Career Path with New Years Resolutions</title><link>https://www.offsec.com/blog/cybersecurity-career-path/</link><guid isPermaLink="true">https://www.offsec.com/blog/cybersecurity-career-path/</guid><description>Learn how to set SMART goals for your cybersecurity career path with some great tips from Dr. Heather Monthie.</description><pubDate>Thu, 10 Feb 2022 00:00:47 GMT</pubDate></item><item><title>Reflections on Failure, Part Two</title><link>https://www.offsec.com/blog/reflections-on-failure-two/</link><guid isPermaLink="true">https://www.offsec.com/blog/reflections-on-failure-two/</guid><description>OffSec&amp;#8217;s Content Product Manager Jeremy Miller continues to reflect on the meaning of failure in cybersecurity in Part II of his blog. </description><pubDate>Tue, 08 Feb 2022 12:00:10 GMT</pubDate></item><item><title>Reflections on Failure, Part One</title><link>https://www.offsec.com/blog/reflections-on-failure-one/</link><guid isPermaLink="true">https://www.offsec.com/blog/reflections-on-failure-one/</guid><description>OffSec&amp;#8217;s Content Product Manager Jeremy Miller reflects on the meaning of failure in cybersecurity in Part I of his blog. </description><pubDate>Mon, 07 Feb 2022 12:00:16 GMT</pubDate></item><item><title>Introducing Topic Exercises</title><link>https://www.offsec.com/blog/topic-exercises/</link><guid isPermaLink="true">https://www.offsec.com/blog/topic-exercises/</guid><description>Topic Exercises within PEN-200 (PWK) give students a more trackable, interactive learning experience. Read on to discover more about this new feature. </description><pubDate>Thu, 03 Feb 2022 11:00:04 GMT</pubDate></item><item><title>Microsoft OneDrive for macOS Local Privilege Escalation</title><link>https://www.offsec.com/blog/microsoft-onedrive-macos-local-privesc/</link><guid isPermaLink="true">https://www.offsec.com/blog/microsoft-onedrive-macos-local-privesc/</guid><description>Security researchers at Offensive Security discovered a vulnerability in the XPC service of Microsoft OneDrive. Here&amp;#8217;s how it works and how to secure it.</description><pubDate>Mon, 31 Jan 2022 12:00:05 GMT</pubDate></item><item><title>What to Expect From the New OSCP Exam</title><link>https://www.offsec.com/blog/what-to-expect-new-oscp-exam/</link><guid isPermaLink="true">https://www.offsec.com/blog/what-to-expect-new-oscp-exam/</guid><description>Three of our Student Mentors share their experiences to help you get familiar with the new OSCP exam environment. Read on to learn more about the new exam changes, their findings, and recommendations to help you better prepare for your OSCP exam.</description><pubDate>Thu, 13 Jan 2022 19:08:59 GMT</pubDate></item><item><title>Cognitive Biases and Penetration Testing</title><link>https://www.offsec.com/blog/cognitive-biases-pentest/</link><guid isPermaLink="true">https://www.offsec.com/blog/cognitive-biases-pentest/</guid><description>Jeremy &amp;#8220;Harbinger&amp;#8221; Miller shares with us his thoughts on cognitive biases and how they relate to penetration testing.</description><pubDate>Wed, 08 Dec 2021 12:30:05 GMT</pubDate></item><item><title>OSCP Exam Change</title><link>https://www.offsec.com/blog/oscp-exam-structure/</link><guid isPermaLink="true">https://www.offsec.com/blog/oscp-exam-structure/</guid><description>Learn about upcoming changes to the OSCP exam structure. New changes will better reflect the current PWK materials and the skills needed to be a successful information security professional.</description><pubDate>Wed, 01 Dec 2021 12:00:02 GMT</pubDate></item><item><title>Learn Subscriptions: Course Structure and New Courses</title><link>https://www.offsec.com/blog/new-course-structure/</link><guid isPermaLink="true">https://www.offsec.com/blog/new-course-structure/</guid><description>Our Learn subscriptions now include two new courses: SOC-200 (for cyber defense roles like SOC Analysts and Threat Hunters) &amp;#038; WEB-200 (for App Security Analysts and Web App Pentesters). Learn about each course and the structure of new courses added to the OffSec Training Library. </description><pubDate>Wed, 17 Nov 2021 11:00:42 GMT</pubDate></item><item><title>Some Thoughts on Teaching Hacking</title><link>https://www.offsec.com/blog/thoughts-teaching-hacking/</link><guid isPermaLink="true">https://www.offsec.com/blog/thoughts-teaching-hacking/</guid><description>OffSec’s Jeremy &amp;#8220;Harbinger&amp;#8221; Miller shares his thoughts on teaching information security, hacking and pentesting by building accurate models of systems, minds and attacks with your students.</description><pubDate>Thu, 11 Nov 2021 13:00:13 GMT</pubDate></item><item><title>Pythonizing Nmap</title><link>https://www.offsec.com/blog/pythonizing-nmap/</link><guid isPermaLink="true">https://www.offsec.com/blog/pythonizing-nmap/</guid><description>Tristram (aka gh0x0st) shares with us some tips for using python to automate nmap and other parts of your penetration testing process.</description><pubDate>Tue, 09 Nov 2021 13:00:51 GMT</pubDate></item><item><title>Downloads in Subscriptions</title><link>https://www.offsec.com/blog/downloads-in-subscriptions/</link><guid isPermaLink="true">https://www.offsec.com/blog/downloads-in-subscriptions/</guid><description>Have you subscribed to the OffSec Training Library? Learn about the development and release of the new OffSec course downloads feature. </description><pubDate>Thu, 28 Oct 2021 09:00:18 GMT</pubDate></item><item><title>The Value of Subscriptions</title><link>https://www.offsec.com/blog/value-of-subscriptions/</link><guid isPermaLink="true">https://www.offsec.com/blog/value-of-subscriptions/</guid><description>Hear from Jim O&amp;#8217;Gorman, Chief Content and Strategy Officer on the value he sees in the new Learn One and Learn Unlimited subscriptions.</description><pubDate>Tue, 12 Oct 2021 13:00:46 GMT</pubDate></item><item><title>New OffSec Training Library Subscriptions: Learn One and Learn Unlimited</title><link>https://www.offsec.com/blog/new-learn-subscriptions/</link><guid isPermaLink="true">https://www.offsec.com/blog/new-learn-subscriptions/</guid><description>The OffSec Training Library is a subscription-based cybersecurity training platform. Discover more about our Learn One and Learn Unlimited subscriptions. </description><pubDate>Tue, 21 Sep 2021 00:00:02 GMT</pubDate></item><item><title>PowerShell Obfuscation</title><link>https://www.offsec.com/blog/powershell-obfuscation/</link><guid isPermaLink="true">https://www.offsec.com/blog/powershell-obfuscation/</guid><description>In this article, community moderator Tristram (gh0x0st) shares with us an approach to scripting payload obfuscation via PowerShell in order to avoid AV and AMSI detection.</description><pubDate>Mon, 23 Aug 2021 13:00:15 GMT</pubDate></item><item><title>Learning how to hack has a long feedback loop.</title><link>https://www.offsec.com/blog/how-we-teach-hacking/</link><guid isPermaLink="true">https://www.offsec.com/blog/how-we-teach-hacking/</guid><description>How do we learn hacking? What is OffSec&amp;#8217;s teaching philosophy? We answer these questions and many more in our &lt;i&gt;How We Teach Hacking&lt;/i&gt; webinar. </description><pubDate>Wed, 11 Aug 2021 13:00:56 GMT</pubDate></item><item><title>What’s New at OffSec – May 2021</title><link>https://www.offsec.com/blog/whats-new-may-2021/</link><guid isPermaLink="true">https://www.offsec.com/blog/whats-new-may-2021/</guid><description>Find the latest on our Discord Server Updates, our recent podcast episodes and the newest applications, tools, etc. created by our OffSec Community Members.
</description><pubDate>Fri, 28 May 2021 13:00:23 GMT</pubDate></item><item><title>Introduction of Recently Retired OSCP Exam Machines in PWK Labs</title><link>https://www.offsec.com/blog/introduction-of-recently-retired-oscp-exam-machines-in-pwk-labs/</link><guid isPermaLink="true">https://www.offsec.com/blog/introduction-of-recently-retired-oscp-exam-machines-in-pwk-labs/</guid><description>Students can now take advantage of their PWK Labs IT network with the addition of 5 retired OSCP exam machines. Learn more about why we&amp;#8217;ve made these changes.
</description><pubDate>Wed, 26 May 2021 16:37:40 GMT</pubDate></item><item><title>eXtended Flow Guard Under The Microscope</title><link>https://www.offsec.com/blog/extended-flow-guard/</link><guid isPermaLink="true">https://www.offsec.com/blog/extended-flow-guard/</guid><description>Microsoft seems to be continuously expanding and evolving its set of security mitigations designed and implemented for Windows 10. In this blog post, we’ll examine an upcoming security feature called eXtended Flow Guard (XFG).</description><pubDate>Tue, 18 May 2021 13:00:28 GMT</pubDate></item><item><title>CVE-2021-1815 – macOS local privilege escalation via Preferences</title><link>https://www.offsec.com/blog/macos-preferences-priv-escalation/</link><guid isPermaLink="true">https://www.offsec.com/blog/macos-preferences-priv-escalation/</guid><description>Apple fixed three vulnerabilities in macOS 11.3’s Preferences. Here we present our writeup about how we identified one of the issues, and how we exploited it.
</description><pubDate>Thu, 06 May 2021 13:00:19 GMT</pubDate></item><item><title>Intel CET In Action</title><link>https://www.offsec.com/blog/intel-cet-in-action/</link><guid isPermaLink="true">https://www.offsec.com/blog/intel-cet-in-action/</guid><description>In this article, we&amp;#8217;ll examine how effective CET is at mitigating real-world exploits that make use of ROP or stack based buffer overflow vulnerabilities.</description><pubDate>Thu, 29 Apr 2021 13:00:27 GMT</pubDate></item><item><title>Understanding the Penetration Testing Tools and Scripts You Can Use</title><link>https://www.offsec.com/blog/understanding-penetration-testing-tools/</link><guid isPermaLink="true">https://www.offsec.com/blog/understanding-penetration-testing-tools/</guid><description>In this blog post Offensive Security will explain why you should take the time to understand and learn about your tools before you run them.  
</description><pubDate>Thu, 22 Apr 2021 20:49:03 GMT</pubDate></item><item><title>What’s New for April 2021</title><link>https://www.offsec.com/blog/whats-new-april-2021/</link><guid isPermaLink="true">https://www.offsec.com/blog/whats-new-april-2021/</guid><description>We’re spilling the details! Find out what’s new and what’s coming with this monthly recap of what’s happening at Offensive Security. 
</description><pubDate>Wed, 14 Apr 2021 13:00:23 GMT</pubDate></item><item><title>The Broader Application of Pentesting Skills</title><link>https://www.offsec.com/blog/pentesting-skills/</link><guid isPermaLink="true">https://www.offsec.com/blog/pentesting-skills/</guid><description>Learn how the fundamental skills taught in Penetration Testing with Kali Linux (PWK) are applicable beyond a career in pentesting.</description><pubDate>Tue, 09 Mar 2021 14:00:40 GMT</pubDate></item><item><title>J3rryBl4nks’s PEN-300 Approach</title><link>https://www.offsec.com/blog/pen300-approach-review/</link><guid isPermaLink="true">https://www.offsec.com/blog/pen300-approach-review/</guid><description>OSCP holder J3rryBl4nks shares his thoughts on Offensive Security’s Evasion Techniques and Breaching Defenses course.</description><pubDate>Tue, 09 Feb 2021 14:00:25 GMT</pubDate></item><item><title>EVASION TECHNIQUES AND BREACHING DEFENSES (PEN-300) AND OSEP EXAM REVIEW</title><link>https://www.offsec.com/blog/pen300-osep-review-nullg0re/</link><guid isPermaLink="true">https://www.offsec.com/blog/pen300-osep-review-nullg0re/</guid><description>What do you need to know before taking Evasion Techniques and Breaching Defenses (PEN-300)? Nullg0re gives us his review on the new course.</description><pubDate>Tue, 19 Jan 2021 14:00:17 GMT</pubDate></item><item><title>OffSec 2020 Recap</title><link>https://www.offsec.com/blog/2020-recap/</link><guid isPermaLink="true">https://www.offsec.com/blog/2020-recap/</guid><description>Take a look back at 2020’s course launches and updates, and learn what to expect in 2021 with this year-end recap from Offensive Security.</description><pubDate>Tue, 15 Dec 2020 13:00:15 GMT</pubDate></item><item><title>Student Spotlight: Perseverance with Rana Khalil</title><link>https://www.offsec.com/blog/student-spotlight-perseverance-growth-rana-khalil/</link><guid isPermaLink="true">https://www.offsec.com/blog/student-spotlight-perseverance-growth-rana-khalil/</guid><description>OSCP holder Rana Khalil shares her journey to becoming a cybersecurity analyst and her thoughts on what it takes to succeed.</description><pubDate>Tue, 24 Nov 2020 13:00:33 GMT</pubDate></item><item><title>Microsoft Teams for macOS Local Privilege Escalation</title><link>https://www.offsec.com/blog/microsoft-teams-macos-local-privesc/</link><guid isPermaLink="true">https://www.offsec.com/blog/microsoft-teams-macos-local-privesc/</guid><description>Security researchers at Offensive Security discovered a vulnerability in the XPC service of Microsoft Teams. Here&amp;#8217;s how it works and how to secure it.</description><pubDate>Tue, 17 Nov 2020 13:00:23 GMT</pubDate></item><item><title>New Pentesting Course: PEN-300</title><link>https://www.offsec.com/blog/new-course-pen300/</link><guid isPermaLink="true">https://www.offsec.com/blog/new-course-pen300/</guid><description>Learn about OffSec’s new Evasion Techniques and Breaching Defenses course (PEN-300) and OSEP certification. This course is one of the replacements for CTP.
</description><pubDate>Tue, 27 Oct 2020 09:00:44 GMT</pubDate></item><item><title>A Path to Success in the PWK Labs</title><link>https://www.offsec.com/blog/pwk-labs-success/</link><guid isPermaLink="true">https://www.offsec.com/blog/pwk-labs-success/</guid><description>As part of our ongoing efforts to support student success, we&amp;#8217;re introducing a new learning path for the PWK labs. Find out more &amp;#8211; along with pass rate data.</description><pubDate>Thu, 15 Oct 2020 16:00:47 GMT</pubDate></item><item><title>How to Build a Cybersecurity Homelab</title><link>https://www.offsec.com/blog/cybersecurity-homelab/</link><guid isPermaLink="true">https://www.offsec.com/blog/cybersecurity-homelab/</guid><description>Build your own home lab with this extensive guide from TJnull. He covers the why and how, offers points of consideration, and shares his top resources.</description><pubDate>Wed, 23 Sep 2020 16:19:15 GMT</pubDate></item><item><title>Wekan Authentication Bypass – Exploiting Common Pitfalls of MeteorJS</title><link>https://www.offsec.com/blog/wekan-authentication-bypass/</link><guid isPermaLink="true">https://www.offsec.com/blog/wekan-authentication-bypass/</guid><description>In this post, Dejan walks us through an authentication bypass vulnerability discovered in Wekan and reported by Offensive Security. </description><pubDate>Tue, 08 Sep 2020 13:00:43 GMT</pubDate></item><item><title>CTP Sunset FAQ</title><link>https://www.offsec.com/blog/ctp-sunset-faq/</link><guid isPermaLink="true">https://www.offsec.com/blog/ctp-sunset-faq/</guid><description>On August 13, 2020, Offensive Security announced that our Cracking the Perimeter course would be retired. Get your questions answered in this update.</description><pubDate>Wed, 26 Aug 2020 16:00:46 GMT</pubDate></item><item><title>Offensive Security Academy: 13 Weeks of Intense PWK Training</title><link>https://www.offsec.com/blog/academy-pwk-training/</link><guid isPermaLink="true">https://www.offsec.com/blog/academy-pwk-training/</guid><description>OffSec launched the new Academy offering to address the impacts of COVID-19 on our PWK live training schedule. Here, we look back on the first cohort.</description><pubDate>Tue, 25 Aug 2020 13:00:13 GMT</pubDate></item><item><title>New Developments: Retiring CTP and Introducing New Courses</title><link>https://www.offsec.com/blog/retiring-ctp-intro-new-courses/</link><guid isPermaLink="true">https://www.offsec.com/blog/retiring-ctp-intro-new-courses/</guid><description>On October 15, 2020, Offensive Security will retire its Cracking the Perimeter course. Find out more about this change, including what comes next.</description><pubDate>Thu, 13 Aug 2020 16:00:37 GMT</pubDate></item><item><title>Creating Kali i3-gaps</title><link>https://www.offsec.com/blog/creating-kali-i3-gaps/</link><guid isPermaLink="true">https://www.offsec.com/blog/creating-kali-i3-gaps/</guid><description>i3 is a tiling window manager for Linux and BSD systems. In this blog post, Arszilla gives a walk through on how he created his custom Kali i3-gaps ISO.</description><pubDate>Tue, 11 Aug 2020 13:00:36 GMT</pubDate></item><item><title>Starting a Career in Information Security</title><link>https://www.offsec.com/blog/case-study-mihai/</link><guid isPermaLink="true">https://www.offsec.com/blog/case-study-mihai/</guid><description>Considering a career in infosec? Mihai’s experience pursuing the OSCP and OSWE certs can help you determine your next steps. Get inspired with this case study.</description><pubDate>Tue, 04 Aug 2020 12:58:15 GMT</pubDate></item><item><title>VulnHub Joins the OffSec Family</title><link>https://www.offsec.com/blog/offsec-vulnhub/</link><guid isPermaLink="true">https://www.offsec.com/blog/offsec-vulnhub/</guid><description>Offensive Security is pleased to announce the acquisition of VulnHub, the platform offering free offline virtual machines for information security training.</description><pubDate>Wed, 29 Jul 2020 13:00:02 GMT</pubDate></item><item><title>AWAE Frequently Asked Questions</title><link>https://www.offsec.com/blog/awae-oswe-faq/</link><guid isPermaLink="true">https://www.offsec.com/blog/awae-oswe-faq/</guid><description>The Advanced Web Attacks and Exploitation (AWAE) course has been updated for 2020. Get your questions about AWAE and OSWE answered.</description><pubDate>Mon, 20 Jul 2020 13:00:17 GMT</pubDate></item><item><title>AWAE: Updated with More Content for 2020</title><link>https://www.offsec.com/blog/awae-2020-update/</link><guid isPermaLink="true">https://www.offsec.com/blog/awae-2020-update/</guid><description>The Advanced Web Attacks and Exploitation (AWAE) course has been updated for 2020. Learn what changed, why we did it, and how it will help you.</description><pubDate>Tue, 14 Jul 2020 11:00:11 GMT</pubDate></item><item><title>Offensive Security AWAE/OSWE Review</title><link>https://www.offsec.com/blog/offensive-security-awae-oswe-review/</link><guid isPermaLink="true">https://www.offsec.com/blog/offensive-security-awae-oswe-review/</guid><description>In this post Mihai gives us a review of his experience with the &lt;b&gt;Advanced Web Attacks And Exploitation&lt;/b&gt; course after obtaining his OSWE certification.</description><pubDate>Tue, 07 Jul 2020 13:00:06 GMT</pubDate></item><item><title>PowerShell Hacking: Mastering PSSession and Reverse Shells on Kali Linux</title><link>https://www.offsec.com/blog/kali-linux-powershell-pentesting/</link><guid isPermaLink="true">https://www.offsec.com/blog/kali-linux-powershell-pentesting/</guid><description>In this series, Tony Punturiero (TJ Null) will be showing how to use PowerShell on Kali Linux to obtain initial access with PSSession on Windows and Linux.</description><pubDate>Tue, 30 Jun 2020 13:00:34 GMT</pubDate></item><item><title>Offensive Security Advanced Web Attacks and Exploitation (AWAE): What You Need To Know</title><link>https://www.offsec.com/blog/awae-what-you-need-to-know/</link><guid isPermaLink="true">https://www.offsec.com/blog/awae-what-you-need-to-know/</guid><description>What do you need to know before taking Advanced Web Attacks and Exploitation (AWAE)? OSCP holder and penetration tester Samuel Whang shares his perspective.
</description><pubDate>Tue, 16 Jun 2020 13:00:43 GMT</pubDate></item><item><title>AMFI syscall</title><link>https://www.offsec.com/blog/amfi-syscall/</link><guid isPermaLink="true">https://www.offsec.com/blog/amfi-syscall/</guid><description>Csaba Fitzl covers the `dyld` restriction decision process in macOS and a previously undiscussed or undocumented AMFI (AppleMobileFileIntegrity) system call.</description><pubDate>Tue, 09 Jun 2020 16:00:04 GMT</pubDate></item><item><title>Offensive Security PWK 2020 Update: Should you upgrade?</title><link>https://www.offsec.com/blog/pwk-2020-upgrade-review/</link><guid isPermaLink="true">https://www.offsec.com/blog/pwk-2020-upgrade-review/</guid><description>OSCP holder Samuel Whang shares his perspective on why upgrading to the 2020 materials is worth it for those who have already completed PWK.
</description><pubDate>Tue, 19 May 2020 13:00:59 GMT</pubDate></item><item><title>macOS Kernel Debugging with SIP</title><link>https://www.offsec.com/blog/macos-kernel-debugging-with-sip/</link><guid isPermaLink="true">https://www.offsec.com/blog/macos-kernel-debugging-with-sip/</guid><description>As security researchers, we often find ourselves needing to look deep into various kernels to fully understand our target and accomplish our goals. Doing so on the Windows platform is no mystery, as there have been countless well-written posts about kernel debugging setups. For macOS, however, the situation is slightly different. There are many great</description><pubDate>Tue, 12 May 2020 13:00:27 GMT</pubDate></item><item><title>Exploit Database SearchSploit Update</title><link>https://www.offsec.com/blog/edb-searchsploit-update-2020/</link><guid isPermaLink="true">https://www.offsec.com/blog/edb-searchsploit-update-2020/</guid><description>To help search the local copy of Exploit DB, we created “SearchSploit“, which gives you a powerful command line interface to perform detailed queries.  SearchSploit has recently been updated. Let&amp;#8217;s review the update and the benefits.</description><pubDate>Tue, 05 May 2020 13:00:05 GMT</pubDate></item><item><title>White Box Testing for Web Applications</title><link>https://www.offsec.com/blog/white-box-testing-web-applications/</link><guid isPermaLink="true">https://www.offsec.com/blog/white-box-testing-web-applications/</guid><description>How can source code review help penetration testers with web application security assessments? Learn the benefits of white box web app penetration testing.</description><pubDate>Tue, 28 Apr 2020 16:00:17 GMT</pubDate></item><item><title>The AWAE/OSWE Journey: A Review</title><link>https://www.offsec.com/blog/the-awae-oswe-journey-a-review/</link><guid isPermaLink="true">https://www.offsec.com/blog/the-awae-oswe-journey-a-review/</guid><description>Donavan Cheah gives us some of his thoughts on the subject of penetration testing, and his journey with the AWAE course in particular.</description><pubDate>Tue, 14 Apr 2020 13:00:56 GMT</pubDate></item><item><title>Customizing Kali Linux</title><link>https://www.offsec.com/blog/kali-linux-customization/</link><guid isPermaLink="true">https://www.offsec.com/blog/kali-linux-customization/</guid><description>One of the designers on the Kali Linux team shares his top tips and tools to customize Kali Linux. Dig in under the hood with Daniel Ruiz de Alegría.
</description><pubDate>Tue, 31 Mar 2020 13:00:02 GMT</pubDate></item><item><title>Attacking the Web: The Offensive Security Way</title><link>https://www.offsec.com/blog/attacking-the-web-offsec-way/</link><guid isPermaLink="true">https://www.offsec.com/blog/attacking-the-web-offsec-way/</guid><description>OffSec student 0xklaue wrote this review of Advanced Web Attacks and Exploitation and the OSWE exam. Find out how to prepare and what you need to know.</description><pubDate>Tue, 24 Mar 2020 13:00:42 GMT</pubDate></item><item><title>Playbook for Running a Global Work-from-Home Company</title><link>https://www.offsec.com/blog/work-from-home-company-playbook/</link><guid isPermaLink="true">https://www.offsec.com/blog/work-from-home-company-playbook/</guid><description>With people located in over 24 countries, we&amp;#8217;ve been working from our homes since our founding in 2006. Here&amp;#8217;s five tips on how to run a distributed team effectively.</description><pubDate>Tue, 17 Mar 2020 17:31:09 GMT</pubDate></item><item><title>Information Security Training Paths at OffSec</title><link>https://www.offsec.com/blog/infosec-training-paths/</link><guid isPermaLink="true">https://www.offsec.com/blog/infosec-training-paths/</guid><description>Find out where to start with OffSec&amp;#8217;s information security training courses. We outline our learning paths to certification and career development.</description><pubDate>Thu, 12 Mar 2020 19:45:44 GMT</pubDate></item><item><title>PWK: All New for 2020</title><link>https://www.offsec.com/blog/pwk-2020-update/</link><guid isPermaLink="true">https://www.offsec.com/blog/pwk-2020-update/</guid><description>Penetration Testing with Kali Linux (PWK) has gotten a massive overhaul for 2020. Find out what’s new in Offensive Security&amp;#8217;s foundational pentesting course.
</description><pubDate>Tue, 11 Feb 2020 01:00:36 GMT</pubDate></item><item><title>Student Spotlight: Mindset and Community with Suhyun Smith, OSCP</title><link>https://www.offsec.com/blog/student-spotlight-mindset-community-suhyun-smith-oscp/</link><guid isPermaLink="true">https://www.offsec.com/blog/student-spotlight-mindset-community-suhyun-smith-oscp/</guid><description>Learn how dedication, mindset, and community empowered Suhyun Smith in her OSCP certification journey, and get her tips for success.
</description><pubDate>Tue, 07 Jan 2020 13:00:09 GMT</pubDate></item><item><title>Student Spotlight: Meet Mihai, a 16 year old OSCP holder</title><link>https://www.offsec.com/blog/meet-mihai-16-year-old-oscp-holder/</link><guid isPermaLink="true">https://www.offsec.com/blog/meet-mihai-16-year-old-oscp-holder/</guid><description>Meet Mihai, a 16 year old OSCP holder and PWK graduate out of Romania. Read more about his tremendous start and journey into infosec.</description><pubDate>Tue, 10 Dec 2019 13:00:48 GMT</pubDate></item><item><title>Student Spotlight: Flood Survivor and OSCP Graduate</title><link>https://www.offsec.com/blog/student-spotlight-flood-survivor-and-oscp-graduate/</link><guid isPermaLink="true">https://www.offsec.com/blog/student-spotlight-flood-survivor-and-oscp-graduate/</guid><description>OffSec student Christopher M Downs takes trying harder to another level: completing (and passing) his OSCP exam in the middle of a New Orleans flood. Read more about Christopher&amp;#8217;s inspiring journey.</description><pubDate>Wed, 27 Nov 2019 13:00:16 GMT</pubDate></item><item><title>My OSCP Guide: A Philosophical Approach</title><link>https://www.offsec.com/blog/my-philosophical-approach-to-oscp/</link><guid isPermaLink="true">https://www.offsec.com/blog/my-philosophical-approach-to-oscp/</guid><description>Samuel Whang, a PWK graduate, details his recommendations and a unique philosophical approach for those looking to pursue their OSCP. 

&lt;small&gt;&lt;i&gt;This article originally appeared on Sep 24, 2019, posted by Samuel Whang. It has been posted with minor edits, with permission from the author. Original post: &lt;a href=&quot;https://medium.com/@klockw3rk/my-oscp-guide-a-philosophical-approach-a98232bc818&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;https://medium.com/@klockw3rk/my-oscp-guide-a-philosophical-approach-a98232bc818&lt;/a&gt;&lt;/i&gt;&lt;/small&gt;</description><pubDate>Thu, 17 Oct 2019 13:00:57 GMT</pubDate></item><item><title>Understanding the Fundamentals of Securing Web Applications</title><link>https://www.offsec.com/blog/fundamentals-of-securing-web-applications/</link><guid isPermaLink="true">https://www.offsec.com/blog/fundamentals-of-securing-web-applications/</guid><description>Web application security can be a rewarding career path. However, the web application security space, and cybersecurity industry as a whole, lives in a constant state of change. An unrelenting curiosity and passion for lifelong learning is mandatory for anyone seeking to specialize in this niche. Here are some fundamentals to help you pursue these skills.</description><pubDate>Tue, 08 Oct 2019 13:00:44 GMT</pubDate></item><item><title>Analyzing a Creative Attack Chain Used to Compromise a Web Application</title><link>https://www.offsec.com/blog/analyzing-a-creative-attack-chain/</link><guid isPermaLink="true">https://www.offsec.com/blog/analyzing-a-creative-attack-chain/</guid><description>In this piece, we’ll analyze a creative scenario where a malicious actor can use an attack chain to exploit a web application via Simple Network Management Protocol (SNMP) &gt; Cross-site scripting (XSS) &gt; Remote Code Execution (RCE).</description><pubDate>Tue, 03 Sep 2019 13:00:54 GMT</pubDate></item><item><title>5 Best Practices for Web Application Security</title><link>https://www.offsec.com/blog/5-best-practices-for-web-application-security/</link><guid isPermaLink="true">https://www.offsec.com/blog/5-best-practices-for-web-application-security/</guid><description>When it comes to web application security, there are many measures you can implement to reduce the chances of an intruder stealing sensitive data, injecting malware into a webpage, or public defacement. As more and more organizations transition their business operations to web applications, security in the development process can no longer be an afterthought. Whether it’s a code injection, privilege escalation, DDoS attack, or a vulnerable element, bad actors are constantly looking for creative ways to manipulate exploits for personal gain. 

We’ve rounded up our top five (5) best practices to help you fortify your application security. 
</description><pubDate>Tue, 20 Aug 2019 16:00:37 GMT</pubDate></item><item><title>BlackHat 2019 Recap</title><link>https://www.offsec.com/blog/blackhat-2019-recap/</link><guid isPermaLink="true">https://www.offsec.com/blog/blackhat-2019-recap/</guid><description>&lt;p style=&quot;text-align:justify;&quot;&gt;BlackHat has always been one of our favorite industry conferences. Although OffSec has been providing educational workshops for years at BlackHat, this was our first year holding an official booth. The booth was a major hit, as we had the opportunity to chat with long-time Offensive Security alumni and also meet some new faces&amp;#8230;&lt;/p&gt;

&lt;p style=&quot;text-align:justify;&quot;&gt;Did you attend one our BlackHat workshops or stop by the OffSec booth? If so, we’d love to hear about your experience and any feedback you might have &amp;#8212; tag us on Twitter &lt;a href=&quot;https://twitter.com/OffSecTraining&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;@OffSecTraining&lt;/a&gt;!&lt;/p&gt;</description><pubDate>Tue, 13 Aug 2019 13:00:00 GMT</pubDate></item><item><title>OSCP/OSCE/OSWP Review</title><link>https://www.offsec.com/blog/oscp-osce-oswp-review/</link><guid isPermaLink="true">https://www.offsec.com/blog/oscp-osce-oswp-review/</guid><description>&lt;p style=&quot;text-align: justify;&quot;&gt;It&amp;#8217;s no secret that Offensive Security offers some of the best technical training in the information security field. Their brand has become synonymous with penetration testing in the eyes of most tech recruiters on LinkedIn.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Some of the most common questions I get on LinkedIn are related to the OSCP/OSCE/OSWP certifications. Some people even go as far as asking for solutions to their exam machines. Sorry, you won&amp;#8217;t be finding anything like that here (TRY HARDER). I will however offer an honest review and offer some tips to help you decide if you are ready to take the plunge into any of these 3 awesome courses!&lt;/p&gt;
&lt;i&gt;&lt;small&gt;This article originally appeared on Jul 20, 2019, posted by Joey Lane and has been republished unedited and in its entirety with permission from the author. Original post: &lt;a href=&quot;https://blog.own.sh/oscp-osce-oswp-review/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;https://blog.own.sh/oscp-osce-oswp-review/&lt;/a&gt;&lt;/small&gt;&lt;/i&gt;</description><pubDate>Tue, 23 Jul 2019 08:00:02 GMT</pubDate></item><item><title>Kali NetHunter App Store – Public Beta</title><link>https://www.offsec.com/blog/kali-nethunter-app-store/</link><guid isPermaLink="true">https://www.offsec.com/blog/kali-nethunter-app-store/</guid><description>&lt;p style=&quot;text-align: justify;&quot;&gt;Kali NetHunter has been undergoing a ton of changes as of late. Now supporting over 50 devices and running on Android devices from KitKat (v4.4) to Pie (v9.0), its amazing the extra capabilities that have been introduced.&lt;/p&gt;

&lt;p style=&quot;text-align: justify;&quot;&gt;But, we don’t want to stop there. After a ton of work, we are really excited to introduce the Kali NetHunter App Store!&lt;/p&gt;</description><pubDate>Tue, 16 Jul 2019 17:27:50 GMT</pubDate></item><item><title>Come see OffSec at BlackHat in Vegas</title><link>https://www.offsec.com/blog/visit-us-at-blackhat-usa-2019/</link><guid isPermaLink="true">https://www.offsec.com/blog/visit-us-at-blackhat-usa-2019/</guid><description>For those planning on attending Black Hat in Las Vegas on August 3-8, come stop by our booth (#2604) in the Business Hall &amp;#8212; which will be available August 7-8. Members from many different teams of OffSec will be there and would love to meet you! Rumors are swirling that we&amp;#8217;ll also be handing out special Challenge Coins to visitors that Try Harder… so make sure to stop by.</description><pubDate>Thu, 11 Jul 2019 17:40:24 GMT</pubDate></item><item><title>AWAE Exam for OSWE Certification now Available with Online Course</title><link>https://www.offsec.com/blog/awae-certification-exam-now-online/</link><guid isPermaLink="true">https://www.offsec.com/blog/awae-certification-exam-now-online/</guid><description>In March we released the online version of Advanced Web Attacks and Exploitations (AWAE) to amazing customer response. Thank you to everyone that has taken the course! We really appreciate the kind words and reviews. Today, we are very pleased to announce the availability of the Offensive Security Web Expert (OSWE) certification.</description><pubDate>Mon, 13 May 2019 15:00:04 GMT</pubDate></item><item><title>Development of a new Windows 10 KASLR Bypass (in One WinDBG Command)</title><link>https://www.offsec.com/blog/development-of-a-new-windows-10-kaslr-bypass-in-one-windbg-command/</link><guid isPermaLink="true">https://www.offsec.com/blog/development-of-a-new-windows-10-kaslr-bypass-in-one-windbg-command/</guid><description>by Morten Schenk Windows 10 1809 Kernel ASLR Bypass Evolution When it is well-implemented, Kernel Address Space Layout Randomization (KASLR) makes Windows kernel exploitation extremely difficult by making it impractical to obtain the base address of a kernel driver directly. In an attempt to bypass this, researchers have historically focussed on kernel address leaks to</description><pubDate>Tue, 19 Mar 2019 13:58:17 GMT</pubDate></item><item><title>AWAE Now Available Anywhere, Anytime</title><link>https://www.offsec.com/blog/awae-now-available-anywhere-anytime/</link><guid isPermaLink="true">https://www.offsec.com/blog/awae-now-available-anywhere-anytime/</guid><description>Our Advanced Web Attacks and Exploitation (AWAE) live training course has been one of the fastest-selling classes at various industry events for years. The Black Hat classes perennially sell out in a matter of minutes, and every year we’re snowed under by demand from security professionals wondering when we’ll offer it online. For this reason, today we’re excited to announce AWAE is now available online&amp;#8230;</description><pubDate>Mon, 18 Mar 2019 12:29:41 GMT</pubDate></item><item><title>Cheating Attempts and the OSCP</title><link>https://www.offsec.com/blog/cheating-attempts-and-the-oscp/</link><guid isPermaLink="true">https://www.offsec.com/blog/cheating-attempts-and-the-oscp/</guid><description>Last week, an individual started to release solutions to certain challenges in the OSCP certification exam. This led to some discussion on Twitter and made it clear to us that there is a fair amount of misunderstanding about what&amp;#8217;s on the exam, how we catch cheaters, how many people attempt to cheat, and what happens when they are discovered. In this post, we would like to shine some light on our certification process.</description><pubDate>Thu, 31 Jan 2019 15:58:57 GMT</pubDate></item><item><title>Offensive Security Appoints Ning Wang as CEO to Lead Organization’s Next Stage of Growth</title><link>https://www.offsec.com/blog/offensive-security-appoints-ning-wang-as-ceo/</link><guid isPermaLink="true">https://www.offsec.com/blog/offensive-security-appoints-ning-wang-as-ceo/</guid><description>&lt;p style=&quot;text-align:justify;&quot;&gt;Today we all constantly read about data breaches that could have been prevented if the impacted organization had just done what they were supposed to do. The unfortunate reality is that cyberattacks are now a matter of &amp;#8216;when&amp;#8217; and not &amp;#8216;if&amp;#8217; for the average enterprise. Yet the landscape is changing and protecting your environment is actually getting more challenging not less.&lt;/p&gt;

&lt;p style=&quot;text-align:justify;&quot;&gt;Cyber adversaries are more organized and talented than ever, so an effective cyber defense now requires more than just following the right processes. Today&amp;#8217;s enterprises need defenders who perform their jobs with an adversarial mindset. While this need is becoming more acute every day, we are also presently in the midst of an enormous cybersecurity skills shortage. These two forces are diametrically opposed and there is only one way toward resolution – practical security training.&lt;/p&gt;

&lt;p style=&quot;text-align:justify;&quot;&gt;This being the case, I couldn&amp;#8217;t be happier to join Offensive Security as the company&amp;#8217;s next CEO.&lt;/p&gt;</description><pubDate>Tue, 15 Jan 2019 21:11:30 GMT</pubDate></item><item><title>Exploit Database Redesign</title><link>https://www.offsec.com/blog/exploit-database-redesign/</link><guid isPermaLink="true">https://www.offsec.com/blog/exploit-database-redesign/</guid><description>&lt;p style=&quot;text-align: justify;&quot;&gt;Offensive Security is delighted to announce the complete redesign of &lt;a href=&quot;https://www.exploit-db.com/&quot; rel=&quot;noopener&quot; target=&quot;_blank&quot;&gt;The Exploit Database&lt;/a&gt; (EDB), making it easier and faster than ever to find the data you need and presenting it to you in a responsive dashboard layout.&lt;/p&gt;</description><pubDate>Mon, 26 Nov 2018 17:30:29 GMT</pubDate></item><item><title>A New Partnership</title><link>https://www.offsec.com/blog/a-new-partnership/</link><guid isPermaLink="true">https://www.offsec.com/blog/a-new-partnership/</guid><description>It’s been a busy few months for us here, and for good reason. Today we are proud to announce our new partners at Offensive Security &amp;#8211; Spectrum Equity.</description><pubDate>Tue, 04 Sep 2018 12:20:18 GMT</pubDate></item><item><title>Offensive Security Online Exam Proctoring</title><link>https://www.offsec.com/blog/proctoring/</link><guid isPermaLink="true">https://www.offsec.com/blog/proctoring/</guid><description>&lt;p style=&quot;text-align: justify;&quot;&gt;When we started out with our online training courses over 12 years ago, we made hard choices about the nature of our courses and certifications. We went against the grain, against the common certification standards, and came up with a unique certification model in the field &amp;#8211; &lt;strong&gt;&amp;#8220;Hands-on, practical certification&amp;#8221;&lt;/strong&gt;. Twelve years later, these choices have paid off. The industry as a whole has realized that most of the multiple choice, technical certifications do not necessarily guarantee a candidate&amp;#8217;s technical level&amp;#8230;and for many in the offensive security field, the OSCP has turned into a golden industry standard. This has been wonderful for certification holders as they find themselves actively recruited by employers due to the fact that they have proven themselves as being able to stand up to the stress of a hard, 24-hour exam &amp;#8211; and still deliver a quality report.&lt;/p&gt;</description><pubDate>Thu, 26 Jul 2018 16:32:49 GMT</pubDate></item><item><title>The Synology Improbability</title><link>https://www.offsec.com/blog/the-synology-improbability/</link><guid isPermaLink="true">https://www.offsec.com/blog/the-synology-improbability/</guid><description>Recently, my manager purchased a Synology NAS device for me to do some backups. Since quite a few people I know use this particular NAS (including myself now), I decided to do a quick audit on it before integrating it into my lab environment. In this blog post, I will cover two different vulnerabilities &lt;a href=&quot;https://www.synology.com/en-global/support/security/Synology_SA_18_02&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;patched&lt;/a&gt; by Synology.</description><pubDate>Tue, 16 Jan 2018 16:09:35 GMT</pubDate></item><item><title>Auditing the Auditor</title><link>https://www.offsec.com/blog/auditing-the-auditor/</link><guid isPermaLink="true">https://www.offsec.com/blog/auditing-the-auditor/</guid><description>&lt;p style=&quot;text-align: justify&quot;&gt;Some time ago, we noticed some security researchers looking for critical vulnerabilities affecting &amp;#8220;security&amp;#8221; based products (such as antivirus) that can have a damaging impact to enterprise and desktop users. Take a stroll through the Google &lt;a href=&quot;https://bugs.chromium.org/p/project-zero/issues/list?can=1&amp;amp;q=owner:taviso@google.com&quot;&gt;Project Zero bug tracker&lt;/a&gt; to see what we mean.</description><pubDate>Wed, 05 Jul 2017 18:31:30 GMT</pubDate></item><item><title>Fldbg, a Pykd script to debug FlashPlayer</title><link>https://www.offsec.com/blog/fldbg-a-pykd-script-to-debug-flashplayer/</link><guid isPermaLink="true">https://www.offsec.com/blog/fldbg-a-pykd-script-to-debug-flashplayer/</guid><description>&lt;p style=&quot;text-align: justify;&quot;&gt;
A few months ago, we decided to make a new module for our &lt;a href=&quot;https://manage.offsec.com/information-security-training/advanced-windows-exploitation/&quot;&gt;Advanced Windows Exploitation&lt;/a&gt; class. After evaluating a few options we chose to work with an Adobe Flash 1day vulnerability originally discovered by the Google Project Zero team. Since we did not have any previous experience with Flash internals, we expected a pretty steep learning curve. &lt;/p&gt;</description><pubDate>Tue, 29 Nov 2016 16:01:17 GMT</pubDate></item><item><title>Hacking WPA Enterprise with Kali Linux</title><link>https://www.offsec.com/blog/hacking-wpa-enterprise-with-kali-linux/</link><guid isPermaLink="true">https://www.offsec.com/blog/hacking-wpa-enterprise-with-kali-linux/</guid><description>&lt;p style=&quot;text-align: justify;&quot;&gt;Admittedly, somewhat of a click-bait blog post title &amp;#8211; but bear with us, it&amp;#8217;s for a good reason. Lots of work goes on behind the scenes of Kali Linux, tools get updated every day and interesting new features are added constantly. Most of these tool updates and feature additions go unannounced, and are then discovered by inquisitive users &amp;#8211; however this time, we had to make an exception.&lt;/p&gt;</description><pubDate>Mon, 21 Nov 2016 22:08:49 GMT</pubDate></item><item><title>A Decade of Exploit Database Data</title><link>https://www.offsec.com/blog/decade-of-exploit-database-data/</link><guid isPermaLink="true">https://www.offsec.com/blog/decade-of-exploit-database-data/</guid><description>&lt;p style=&quot;text-align: justify;&quot;&gt;Managing the &lt;a href=&quot;https://www.exploit-db.com/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Exploit Database&lt;/a&gt; is one of those ongoing tasks that ends up taking a significant amount of time and often, we don&amp;#8217;t take the time to step back and look at the trends as they occur over time. Have there been more exploits over the years? Perhaps fewer? Is there a shift in platforms being targeted? Has the bar for exploits indeed been raised with the increase in more secure operating system protections?&lt;/p&gt;
</description><pubDate>Mon, 02 May 2016 16:28:50 GMT</pubDate></item><item><title>What it means to be an OSCP reloaded</title><link>https://www.offsec.com/blog/what-it-means-to-be-an-oscp-reloaded/</link><guid isPermaLink="true">https://www.offsec.com/blog/what-it-means-to-be-an-oscp-reloaded/</guid><description>&lt;p style=&quot;text-align: justify;&quot;&gt;In our recent blog post  &amp;#8220;&lt;a href=&quot;https://manage.offsec.com/offsec/what-it-means-to-be-oscp/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;What it means to be an OSCP&lt;/a&gt;&amp;#8221; we asked OSCPs to share their experience of what it means to have earned this certification and we received many tales of hardship and reward. Mike Benich sent in an entry that we felt very much captured the essence of the Offensive Security mentality; that the path to OSCP is challenging, stressful, and demanding, but the results leave you with much more than technological expertise.&lt;/p&gt;</description><pubDate>Tue, 22 Mar 2016 13:03:11 GMT</pubDate></item><item><title>Kali Linux 2.1.2 ARM Releases</title><link>https://www.offsec.com/blog/kali-linux-2-1-2-arm-releases/</link><guid isPermaLink="true">https://www.offsec.com/blog/kali-linux-2-1-2-arm-releases/</guid><description>&lt;p style=&quot;text-align: justify;&quot;&gt;The time has come for yet another Kali ARM image release with new and updated images. Our collection of supported ARM hardware grows constantly with new images from &lt;strong&gt;Raspberry Pi 3&lt;/strong&gt;, &lt;strong&gt;Banana Pi&lt;/strong&gt; and &lt;strong&gt;Odroid-C2&lt;/strong&gt;, with the latter being our first real &lt;strong&gt;arm64&lt;/strong&gt; image. We&amp;#8217;re really excited about our new arm64 build environment and hope to see more 64bit ARM devices running Kali in the future. Feel free to visit our &lt;a href=&quot;https://manage.offsec.com/kali-linux-arm-images/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Kali Linux ARM downloads&lt;/a&gt; page to get the latest goodness.&lt;/p&gt;</description><pubDate>Mon, 21 Mar 2016 16:54:53 GMT</pubDate></item><item><title>Kali Rolling ISO of DOOM, Too.</title><link>https://www.offsec.com/blog/kali-rolling-iso-of-doom/</link><guid isPermaLink="true">https://www.offsec.com/blog/kali-rolling-iso-of-doom/</guid><description>&lt;p style=&quot;text-align: justify;&quot;&gt;A while back we introduced the idea of Kali Linux Customization by demonstrating the &lt;a href=&quot;https://manage.offsec.com/kali-linux/kali-linux-iso-of-doom/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Kali Linux ISO of Doom&lt;/a&gt;. Our scenario covered the installation of a custom Kali configuration which contained select tools required for a remote vulnerability assessment. The customised Kali ISO would undergo an &lt;strong&gt;unattended autoinstall&lt;/strong&gt; in a remote client site, and automatically &lt;strong&gt;connect back&lt;/strong&gt; to our OpenVPN server over TCP port 443. The OpenVPN connection would then &lt;strong&gt;bridge the remote and local networks&lt;/strong&gt;, allowing us full &amp;#8220;layer 3&amp;#8221; access to the internal network from our remote location. The resulting custom ISO could then be sent to the client who would just pop it into a virtual machine template, and the whole setup would happen automagically with no intervention &amp;#8211; as depicted in the image below.&lt;/p&gt;</description><pubDate>Thu, 11 Feb 2016 14:54:46 GMT</pubDate></item><item><title>Kali Linux Rolling Virtual &amp; ARM Images</title><link>https://www.offsec.com/blog/kali-rolling-virtual-arm-images/</link><guid isPermaLink="true">https://www.offsec.com/blog/kali-rolling-virtual-arm-images/</guid><description>&lt;p style=&quot;text-align: justify&quot;&gt;With the recent release of &lt;strong&gt;&lt;a href=&quot;https://www.kali.org/news/kali-linux-rolling-edition-2016-1/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Kali Rolling 2016.1&lt;/a&gt;&lt;/strong&gt; completed, we&amp;#8217;ve gone ahead and updated our custom Kali VMware, VirtualBox, and ARM images. Here&amp;#8217;s a few news items and updates that we have regarding these images for those who prefer to get them pre-built.&lt;/p&gt;</description><pubDate>Tue, 02 Feb 2016 17:25:47 GMT</pubDate></item><item><title>Kali NetHunter 3.0 Released</title><link>https://www.offsec.com/blog/nethunter-3-0-released/</link><guid isPermaLink="true">https://www.offsec.com/blog/nethunter-3-0-released/</guid><description>&lt;p style=&quot;text-align: justify&quot;&gt;NetHunter has been actively developed for over a year now, and  has undergone &lt;strong&gt;nothing short of a complete transformation&lt;/strong&gt; since its last release. We&amp;#8217;ve taken our time with v3.0, and the results are a complete overhaul of the NetHunter Android application, with a more polished interface and a fully functioning feature set.&lt;/p&gt;
&lt;p style=&quot;text-align: justify&quot;&gt;Through the amazing NetHunter community work led by  &lt;strong&gt;binkybear&lt;/strong&gt;, &lt;strong&gt;fattire,&lt;/strong&gt; and &lt;strong&gt;jmingov&lt;/strong&gt;, we can now proudly look at NetHunter and confidently consider it to be a stable, commercial grade  mobile penetration testing platform. And so, we are &lt;strong&gt;really&lt;/strong&gt; excited with todays release of NetHunter 3.0 &amp;#8211; let the games begin!&lt;/p&gt;</description><pubDate>Wed, 06 Jan 2016 15:39:03 GMT</pubDate></item><item><title>What it means to be an OSCP</title><link>https://www.offsec.com/blog/what-it-means-to-be-oscp/</link><guid isPermaLink="true">https://www.offsec.com/blog/what-it-means-to-be-oscp/</guid><description>&lt;p style=&quot;text-align: justify;&quot;&gt;When a student earns an Offensive Security certification such as the OSCP, it is a testament to the personal investment they have made as part of a commitment to excellence. Like getting a degree from a university, no matter what happens in your life from that point forward, the fact is your earned that certification and it is yours to keep. Saying this, there are some hard truths behind the path to OSCP.&lt;/p&gt;</description><pubDate>Mon, 04 Jan 2016 17:18:27 GMT</pubDate></item><item><title>MASSCAN Web Interface</title><link>https://www.offsec.com/blog/masscan-web-interface/</link><guid isPermaLink="true">https://www.offsec.com/blog/masscan-web-interface/</guid><description>&lt;p style=&quot;text-align: justify;&quot;&gt;A couple of weeks ago, we had the opportunity to scan and map a large IP address space covering just over 3 million hosts. Our tool of choice for this was the fast and capable &lt;a href=&quot;https://github.com/robertdavidgraham/masscan&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;masscan&lt;/a&gt;, which is packaged in Kali. While masscan has several convenient output formats, such as &lt;a href=&quot;https://github.com/robertdavidgraham/masscan#getting-output&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;binary and XML&lt;/a&gt;, one feature we were missing was an easy way to search our results. We quickly whipped up a little web interface that would allow us to import and search within a masscan XML output file. This feature proved very useful for us &amp;#8211; as once we identified a specific vulnerable pattern on a machine, we could easily cross reference this pattern with over the millions of discovered hosts in our database.&lt;/p&gt;</description><pubDate>Fri, 04 Dec 2015 14:53:45 GMT</pubDate></item><item><title>Kali Linux 2.0 Top 10 Post Install Tips</title><link>https://www.offsec.com/blog/top-10-post-install-tips/</link><guid isPermaLink="true">https://www.offsec.com/blog/top-10-post-install-tips/</guid><description>&lt;p style=&quot;text-align: justify;&quot;&gt;With Kali 2.0 now released, we wanted to share a few post install procedures we find ourselves repeating over and over, in the hopes that you will find them useful as well. We&amp;#8217;ve also slapped in some answers to common questions we&amp;#8217;ve been getting. &lt;strong&gt;Here is our top 10 list&lt;/strong&gt;:&lt;/p&gt;</description><pubDate>Wed, 12 Aug 2015 23:12:47 GMT</pubDate></item><item><title>Kali 2.0 Dojo Black Hat / DEF CON USA 2015</title><link>https://www.offsec.com/blog/kali-dojo-bhusa-2015/</link><guid isPermaLink="true">https://www.offsec.com/blog/kali-dojo-bhusa-2015/</guid><description>&lt;p style=&quot;text-align: justify;&quot;&gt;Last years event was a rousing success, with many attendees staying all day long and working through the multiple exercises. We had such a great time, we wanted to do it again. This is a great chance to get hands on with &lt;strong&gt;Kali 2.0&lt;/strong&gt;, learning the cutting edge features and how to best put them to use. In this two session workshop series, we will be covering how to create your own custom Kali ISO that is tweaked and modified to exactly fit your needs. This will be followed up in the second session with a hands-on exercise of deploying Kali on USB sticks so that it contains several persistent storage profiles, both regular and encrypted &amp;#8211; including the&lt;strong&gt; LUKS nuke&lt;/strong&gt; feature.&lt;/p&gt;
</description><pubDate>Mon, 08 Jun 2015 02:38:06 GMT</pubDate></item><item><title>What’s New with Exploit Database?</title><link>https://www.offsec.com/blog/exploit-database-update/</link><guid isPermaLink="true">https://www.offsec.com/blog/exploit-database-update/</guid><description>New Features in the Exploit Database Over the past 6 years, we have been maintaining and updating the Exploit Database on a daily basis, which now boasts over 35,000 exploits. While we constantly work on improving our back-end and entry quality. Over the years there haven’t really been any updates to the front-end, which has</description><pubDate>Wed, 13 May 2015 19:29:35 GMT</pubDate></item><item><title>Booting Kali Linux Live Over HTTP</title><link>https://www.offsec.com/blog/booting-kali-linux-live-http/</link><guid isPermaLink="true">https://www.offsec.com/blog/booting-kali-linux-live-http/</guid><description>Kali Linux Features Here at Offensive Security, we tend to use Kali Linux in unconventional ways – often making use of some really amazing features that Kali Linux has to offer. One of these interesting use-cases includes booting instances of Kali Linux Live over HTTP, directly to RAM. We realized there’s little documentation around this</description><pubDate>Mon, 11 May 2015 23:25:11 GMT</pubDate></item><item><title>NetHunter 1.2 – Lollipop &amp; Nexus 6/9</title><link>https://www.offsec.com/blog/nethunter-1-2-lollipop-nexus-six-and-nine/</link><guid isPermaLink="true">https://www.offsec.com/blog/nethunter-1-2-lollipop-nexus-six-and-nine/</guid><description>Kali NetHunter 1.2 Released! Kali NetHunter 1.2 is fresh out, with a whole bunch of improvements, bug fixes….and yes, Android Lollipop support. This means that NetHunter now supports the Nexus6 and Nexus 9 devices too! This is awesome news to all those who have bought these new Nexus devices and have yearned to install the</description><pubDate>Mon, 11 May 2015 23:13:25 GMT</pubDate></item><item><title>Kali Linux on a Raspberry Pi (A/B+/2) with Disk Encryption</title><link>https://www.offsec.com/blog/raspberry-pi-luks-disk-encryption/</link><guid isPermaLink="true">https://www.offsec.com/blog/raspberry-pi-luks-disk-encryption/</guid><description>&lt;p style=&quot;text-align: justify;&quot;&gt;With the advent of smaller, faster ARM hardware such as the new &lt;strong&gt;Raspberry Pi 2&lt;/strong&gt; (which now has a &lt;a title=&quot;Kali Linux Downloads&quot; href=&quot;https://manage.offsec.com/kali-linux-vm-vmware-virtualbox-image-download/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Kali image built&lt;/a&gt; for it), we&amp;#8217;ve been seeing more and more use of these small devices as &amp;#8220;&lt;strong&gt;throw-away hackboxes&lt;/strong&gt;&amp;#8220;. While this might be a new and novel technology, &lt;strong&gt;there&amp;#8217;s one major drawback&lt;/strong&gt; to this concept &amp;#8211; and that is the &lt;strong&gt;confidentiality of the data&lt;/strong&gt; stored on the device itself. Most of the setups we&amp;#8217;ve seen do little to protect the sensitive information saved on the SD cards of these little computers.&lt;/p&gt;</description><pubDate>Mon, 09 Mar 2015 08:03:17 GMT</pubDate></item><item><title>OffSec InfoSec Certifications in the Job Market</title><link>https://www.offsec.com/blog/offensive-security-infosec-certifications-job-market/</link><guid isPermaLink="true">https://www.offsec.com/blog/offensive-security-infosec-certifications-job-market/</guid><description>A couple of weeks ago we published our comic Try Harder song, praising the OSCP certification and our students in general. It was really well received by our alumni, who related closely to the theme of &amp;#8220;Try Harder&amp;#8220;. However, there is a more serious undertone to this than meets the eye. Information Security Certifications Mean Little</description><pubDate>Mon, 02 Feb 2015 15:11:12 GMT</pubDate></item><item><title>Kali USB – Multiple Persistent Stores</title><link>https://www.offsec.com/blog/usb-multiple-persistent-stores/</link><guid isPermaLink="true">https://www.offsec.com/blog/usb-multiple-persistent-stores/</guid><description>&lt;p style=&quot;text-align: justify;&quot;&gt;One of the markings of the 1.0.7 Kali release was the introduction of &lt;a href=&quot;https://manage.offsec.com/kali-linux/kali-encrypted-usb-persistence/&quot; title=&quot;Kali Encrypted USB Persistence&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Kali Live USB LUKS encrypted persistent storage&lt;/a&gt;, on which we further elaborated in one of our previous blog posts. However, we&amp;#8217;re not done yet with USB persistent storage as more features in Kali remain to be explored.&lt;/p&gt;</description><pubDate>Tue, 27 Jan 2015 14:56:41 GMT</pubDate></item><item><title>Offensive Security Say – Try Harder!</title><link>https://www.offsec.com/blog/say-try-harder/</link><guid isPermaLink="true">https://www.offsec.com/blog/say-try-harder/</guid><description>&lt;p style=&quot;text-align: justified;&quot;&gt;Offsec students go through hell. They endure levels of stress and frustration beyond what is considered normal, and we at Offsec appreciate this. So much in fact, that we&amp;#8217;ve dedicated the following song to anyone who&amp;#8217;s taken an Offsec course, and tried harder!&lt;/p&gt;</description><pubDate>Mon, 19 Jan 2015 19:07:42 GMT</pubDate></item><item><title>NetHunter 1.1 Released</title><link>https://www.offsec.com/blog/nethunter-1-1-released/</link><guid isPermaLink="true">https://www.offsec.com/blog/nethunter-1-1-released/</guid><description>&lt;p style=&quot;text-align: justify;&quot;&gt;With the opening shots of 2015 fired, we are happy to make some announcements in the NetHunter arena! One of the things that excite us the most about Kali Linux is how our Kali projects always end up being greater than the sum of their parts. This is most evident in our &lt;a title=&quot;Kali Linux NetHunter&quot; href=&quot;https://manage.offsec.com/kali-linux-nethunter-download/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Kali NetHunter Project&lt;/a&gt; &amp;#8211; the first open source Android based penetration testing platform for Nexus and &lt;a href=&quot;https://oneplus.net/&quot; title=&quot;OnePlus phones&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;OnePlus&lt;/a&gt; devices. Wait, &lt;strong&gt;OnePlus phones&lt;/strong&gt;? Yes! Our new NetHunter v1.1 release brings with it some great news &amp;#8211; and so we begin.&lt;/p&gt;</description><pubDate>Mon, 05 Jan 2015 15:10:20 GMT</pubDate></item><item><title>Happy Holidays from Offsec</title><link>https://www.offsec.com/blog/happy-holidays-from-offsec/</link><guid isPermaLink="true">https://www.offsec.com/blog/happy-holidays-from-offsec/</guid><description>&lt;p style=&quot;text-align: justify;&quot;&gt;We at Offensive Security would like to thank all of our students, customers, and friends for a wonderful 2014. Its been a busy but productive year, with major upgrades to &lt;a href=&quot;https://www.kali.org&quot; title=&quot;Kali Linux&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Kali Linux&lt;/a&gt;, the release of &lt;a href=&quot;https://manage.offsec.com/kali-linux-nethunter-download/&quot; title=&quot;Kali Linux Nethunter&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Kali NetHunter&lt;/a&gt;, the public launch of the &lt;a href=&quot;https://manage.offsec.com/offsec/professional-penetration-testing-labs/&quot; title=&quot;Professional Penetration Testing Labs&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;hosted virtual labs&lt;/a&gt;, the first ever &lt;a href=&quot;https://www.kali.org/kali-linux-dojo-workshop/&quot; title=&quot;Kali Linux Dojo&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Kali Linux Dojo&lt;/a&gt;, upgrades to our student labs, lots of interesting R&amp;#038;D, a bunch of &lt;a href=&quot;https://manage.offsec.com/vulndev/symantec-endpoint-protection-0day/&quot; title=&quot;Symantec Endpoint Protection 0day&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;0-days&lt;/a&gt; and a number of other accomplishments. We enjoyed the journey with all of you and here is to a fun and productive 2015! We wanted to thank you with this video we produced for all y&amp;#8217;all.&lt;/p&gt;</description><pubDate>Mon, 22 Dec 2014 19:28:15 GMT</pubDate></item><item><title>Professional Penetration Testing Labs</title><link>https://www.offsec.com/blog/professional-penetration-testing-labs/</link><guid isPermaLink="true">https://www.offsec.com/blog/professional-penetration-testing-labs/</guid><description>&lt;p style=&quot;text-align: justify&quot;&gt;For the past few months, we have been quietly beta testing and perfecting our new Enterprise Penetration Testing Labs, or as we fondly call it, the &amp;#8220;Offensive Security Proving Grounds (PG)&amp;#8221;. Today, we are proud to unveil our hosted penetration testing labs &amp;#8211; a safe virtual network environment designed to be attacked and penetrated as a means of learning and sharpening your penetration testing skills. The new design of the &lt;b&gt;&lt;a href=&quot;https://manage.offsec.com/labs/&quot;&gt;Proving Grounds&lt;/a&gt;&lt;/b&gt; include multiple interconnected subnets with a wide array of modern operating systems, including Active Directory domains, Citrix systems, corporate Antivirus solutions as well as Intrusion Prevention Systems which attackers must learn to cope with.&lt;/p&gt;</description><pubDate>Mon, 15 Dec 2014 18:42:25 GMT</pubDate></item><item><title>Bypassing Windows and OSX Logins with NetHunter &amp; Kon-boot</title><link>https://www.offsec.com/blog/bypassing-windows-and-osx-logins-with-nethunter-kon-boot/</link><guid isPermaLink="true">https://www.offsec.com/blog/bypassing-windows-and-osx-logins-with-nethunter-kon-boot/</guid><description>&lt;p style=&quot;text-align: justify;&quot;&gt;The Kali Linux &lt;a href=&quot;https://manage.offsec.com/kali-linux-nethunter-download/&quot; title=&quot;Kali Linux NetHunter Download&quot;&gt;NetHunter&lt;/a&gt; platform has many hidden features which we still haven&amp;#8217;t brought to light. One of them is the &lt;a href=&quot;https://play.google.com/store/apps/details?id=com.softwarebakery.drivedroid&amp;#038;hl=en&quot; title=&quot;DriveDroid&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;DriveDroid&lt;/a&gt; application and patch set, which have been implemented in NetHunter since v1.0.2. This tool allows us to have NetHunter emulate a bootable ISO or USB, using images of our choosing. That&amp;#8217;s right, you can use NetHunter as a boot device which holds a library of bootable ISOs and images&amp;#8230;And so we begin:&lt;/p&gt;
</description><pubDate>Mon, 08 Dec 2014 16:05:05 GMT</pubDate></item><item><title>Kali with Raspberry Pi TFT support</title><link>https://www.offsec.com/blog/kali-with-raspberry-pi-tft-support/</link><guid isPermaLink="true">https://www.offsec.com/blog/kali-with-raspberry-pi-tft-support/</guid><description>&lt;p style=&quot;text-align: justify;&quot;&gt;Several weeks ago a request in the &lt;a href=&quot;https://forums.kali.org/showthread.php?22949-Raspberry-pi-B-with-Adafruit-2-8in-TFT&quot; title=&quot;Kali Linux Forums&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Kali forums&lt;/a&gt; prompted us to look at the integration of the &lt;a href=&quot;http://www.adafruit.com/product/376&quot; title=&quot;2.8&amp;quot; TFT Touch Shield for Arduino&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Adafruit 2.8in TFT touch screen&lt;/a&gt; for Kali Linux. A few weeks and much less hair later, we are happy to announce the availability of this image in our &lt;a href=&quot;https://manage.offsec.com/kali-linux-vm-vmware-virtualbox-image-download/&quot; title=&quot;Kali Linux Downloads&quot;&gt;Offensive Security custom Kali images&lt;/a&gt; section.&lt;/p&gt;</description><pubDate>Wed, 19 Nov 2014 20:42:16 GMT</pubDate></item><item><title>Disarming and Bypassing EMET 5.1</title><link>https://www.offsec.com/blog/disarming-and-bypassing-emet-5-1/</link><guid isPermaLink="true">https://www.offsec.com/blog/disarming-and-bypassing-emet-5-1/</guid><description>&lt;p style=&quot;text-align: justify;&quot;&gt;Last week Microsoft released EMET 5.1 to address some compatibility issues and strengthen mitigations to make them more resilient to attacks and bypasses. We, of course, were curious to see if our &lt;a href=&quot;https://manage.offsec.com/vulndev/disarming-emet-v5-0/&quot; title=&quot;Disarming EMET v5.0&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;EMET 5.0 disarming technique&lt;/a&gt; has been addressed by the latest version of the toolkit.&lt;/p&gt;
</description><pubDate>Tue, 18 Nov 2014 14:46:58 GMT</pubDate></item><item><title>Kali Nexus NetHunter 1.0.2</title><link>https://www.offsec.com/blog/kali-nexus-nethunter-1-0-2/</link><guid isPermaLink="true">https://www.offsec.com/blog/kali-nexus-nethunter-1-0-2/</guid><description>&lt;p style=&quot;text-align: justify;&quot;&gt;It&amp;#8217;s been a week since our release of the &lt;a href=&quot;https://manage.offsec.com/kali-linux-nethunter-download/&quot; title=&quot;Kali Linux NetHunter Download&quot;&gt;Kali Linux NetHunter&lt;/a&gt;, and the feedback is amazing. A NetHunter community has sprung up from nowhere, and the &lt;a title=&quot;Kali Linux NetHunter Forums&quot; href=&quot;https://forums.kali.org/forumdisplay.php?14-NetHunter-Forums&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;forums&lt;/a&gt; and &lt;a title=&quot;Kali NetHunter Github&quot; href=&quot;https://gitlab.com/kalilinux/nethunter/build-scripts/kali-nethunter-project&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;github&lt;/a&gt; pages are really active. We&amp;#8217;re completely stoked about this community response, and are eager to see it grow. After an intense week of community testing and a slew of bugfixes (including shellshock), we thought it would be a good opportunity to release a NetHunter update. &lt;span style=&quot;color: #800000;&quot;&gt;&lt;strong&gt;Please welcome NetHunter 1.0.2&lt;/strong&gt;&lt;/span&gt;.&lt;/p&gt;</description><pubDate>Wed, 01 Oct 2014 15:06:52 GMT</pubDate></item><item><title>Disarming EMET v5.0</title><link>https://www.offsec.com/blog/disarming-emet-v5-0/</link><guid isPermaLink="true">https://www.offsec.com/blog/disarming-emet-v5-0/</guid><description>&lt;p style=&quot;text-align: justify;&quot;&gt;In our previous &lt;a title=&quot;Disarming Enhanced Mitigation Experience Toolkit  (EMET)&quot; href=&quot;https://manage.offsec.com/vulndev/disarming-enhanced-mitigation-experience-toolkit-emet/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Disarming Emet 4.x&lt;/a&gt; blog post, we demonstrated how to disarm the ROP mitigations introduced in EMET 4.x by abusing a global variable in the &lt;em&gt;.data&lt;/em&gt; section located at a static offset. A general overview of the EMET 5 technical preview has been recently published &lt;a title=&quot;EMET 5.0 Review&quot; href=&quot;http://0xdabbad00.com/2014/02/27/emet-5.0-review/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;here&lt;/a&gt;. &lt;/p&gt;</description><pubDate>Mon, 29 Sep 2014 17:11:39 GMT</pubDate></item><item><title>Symantec Endpoint Protection 0day</title><link>https://www.offsec.com/blog/symantec-endpoint-protection-0day/</link><guid isPermaLink="true">https://www.offsec.com/blog/symantec-endpoint-protection-0day/</guid><description>&lt;p style=&quot;text-align: justify;&quot;&gt;In a recent engagement, we had the opportunity to audit a leading Antivirus Endpoint Protection solution, where we found a multitude of vulnerabilities. Some of these made it to CERT, while others have been scheduled for review during our upcoming AWE course at Black Hat 2014, Las Vegas. Ironically, the same software that was meant to protect the organization under review was the reason for its compromise.&lt;/p&gt;</description><pubDate>Tue, 29 Jul 2014 14:46:22 GMT</pubDate></item><item><title>Disarming Enhanced Mitigation Experience Toolkit  (EMET)</title><link>https://www.offsec.com/blog/disarming-enhanced-mitigation-experience-toolkit-emet/</link><guid isPermaLink="true">https://www.offsec.com/blog/disarming-enhanced-mitigation-experience-toolkit-emet/</guid><description>&lt;p style=&quot;text-align: justify;&quot;&gt;
With the emergence of recent Internet Explorer Vulnerabilities, we&amp;#8217;ve been seeing a trend of &lt;a href=&quot;http://support.microsoft.com/kb/2458544&quot; title=&quot;EMET&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;EMET&lt;/a&gt; recommendations as a path to increasing &lt;a href=&quot;https://manage.offsec.com/application-security-assessment/&quot;&gt;application security&lt;/a&gt;. A layered defense is always helpful as it increases the obstacles in the path of an attacker. However, we were wondering how much does it really benefit? How much harder does an attacker have to work to bypass these additional protections? With that in mind, we started a deep dive into EMET. &lt;/p&gt;</description><pubDate>Tue, 01 Jul 2014 19:04:08 GMT</pubDate></item><item><title>Kali Linux Evil Wireless Access Point</title><link>https://www.offsec.com/blog/kali-linux-evil-wireless-access-point/</link><guid isPermaLink="true">https://www.offsec.com/blog/kali-linux-evil-wireless-access-point/</guid><description>&lt;p style=&quot;text-align: justify;&quot;&gt;A few days ago, we had the opportunity to deploy a rogue access point that would steal user credentials using a fake, captive web portal, and provide MITM&amp;#8217;d Internet services via 3G. We needed reliability and scalability in our environment as there would potentially be a large amount of, erm&amp;#8230;.&amp;#8221;participants&amp;#8221; in this wireless network. We were pretty happy with the result and quickly realized that we had created a new &amp;#8220;Kali Linux recipe&amp;#8221;. Or in other words, we could &lt;strong&gt;create a custom, bootable wireless evil access point image&lt;/strong&gt;, which could do all sorts of wondrous things.&lt;/p&gt;</description><pubDate>Tue, 10 Jun 2014 16:29:05 GMT</pubDate></item><item><title>Announcing the Kali Linux Dojo</title><link>https://www.offsec.com/blog/kali-linux-workshop/</link><guid isPermaLink="true">https://www.offsec.com/blog/kali-linux-workshop/</guid><description>&lt;p style=&quot;text-align: justify;&quot;&gt;For the past 6 months, we&amp;#8217;ve been busy silently developing an advanced Kali Linux course the likes of which has not yet been seen in the industry. This set of in-depth, practical workshops focuses on the Kali operating system itself, demonstrating some of its advanced features and use-cases by its developers. As with all &amp;#8220;Offensive Security&amp;#8221; training, this workshop is intensive, educational, and addictively engaging. If you&amp;#8217;ve ever wished for fluent proficiency with Kali Linux, this workshop is for you.&lt;/p&gt;
</description><pubDate>Wed, 28 May 2014 22:19:22 GMT</pubDate></item><item><title>Kali Encrypted USB Persistence</title><link>https://www.offsec.com/blog/kali-encrypted-usb-persistence/</link><guid isPermaLink="true">https://www.offsec.com/blog/kali-encrypted-usb-persistence/</guid><description>&lt;p style=&quot;text-align: justify;&quot;&gt;A couple of days ago, we added an awesome new feature to Kali allowing users to set up a Live Kali USB with encrypted persistence. What this means is that you can now set up a bootable Kali USB drive allowing you to either boot to a &amp;#8220;clean&amp;#8221; Kali image or alternatively, overlay it with the contents of a persistent encrypted partition, allowing you to securely save your changes on the USB drive between reboots. If you add our &lt;a href=&quot;https://www.kali.org/tutorials/emergency-self-destruction-luks-kali/&quot; title=&quot;Kali Linux LUKS nuke&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;LUKS nuke feature&lt;/a&gt; into this mix together with a 32GB USB 3.0 thumb drive, you&amp;#8217;ve got yourself a fast, versatile and secure &amp;#8220;Penetration Testing Travel Kit&amp;#8221;.&lt;/p&gt;</description><pubDate>Tue, 27 May 2014 13:02:41 GMT</pubDate></item><item><title>Kali Linux Recipes</title><link>https://www.offsec.com/blog/kali-linux-recipes/</link><guid isPermaLink="true">https://www.offsec.com/blog/kali-linux-recipes/</guid><description>&lt;p style=&quot;text-align: justify;&quot;&gt;A couple of days ago, we received an e-mail from a university professor asking for advice regarding Linux distributions to be used in his security 101 classes. In its default configuration, Kali Linux wasn&amp;#8217;t a 100% match for his needs, which were quite specific:&lt;/p&gt;</description><pubDate>Wed, 23 Apr 2014 15:24:23 GMT</pubDate></item><item><title>Kali Linux Trademarks</title><link>https://www.offsec.com/blog/kali-linux-trademarks/</link><guid isPermaLink="true">https://www.offsec.com/blog/kali-linux-trademarks/</guid><description>&lt;p style=&quot;text-align: justify;&quot;&gt;It’s been a year since we’ve released &lt;a href=&quot;https://www.kali.org&quot; title=&quot;Kali Linux&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Kali Linux&lt;/a&gt;, and we’re happy to see it succeed. Kali has surpassed BackTrack Linux in many ways and the community is responding accordingly. Between the improved development cycle, more attentive support, and larger community, Kali Linux has reached new heights of popularity. This popularity however, does not come without its own issues. One of the big problems we&amp;#8217;ve been facing in the past year is rampant violations of our Kali Linux &lt;a href=&quot;http://docs.kali.org/kali-policy/kali-linux-trademark-policy&quot; title=&quot;Kali Linux Trademark Policy&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Trademarks&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Mon, 17 Mar 2014 17:38:14 GMT</pubDate></item><item><title>Generating Kali Raspberry Pi Images</title><link>https://www.offsec.com/blog/generating-kali-raspberry-pi-images/</link><guid isPermaLink="true">https://www.offsec.com/blog/generating-kali-raspberry-pi-images/</guid><description>&lt;p style=&quot;text-align: justify;&quot;&gt;&amp;#8220;&lt;span style=&quot;color: #000000;&quot;&gt;&lt;strong&gt;Kali Linux Raspberry Pi Image Updated!&lt;/strong&gt;&lt;/span&gt;&amp;#8221; That was supposed to be the &amp;#8220;tweet&amp;#8221; we would release, telling everyone our new Kali Linux Raspberry Pi image was supposedly better than our old one. We often update our followers with news like this on twitter, and this tweet would be no different. However, this time, we thought it would be interesting to tell you about the mechanics of updates like these, and shed some light on how these &amp;#8220;news items&amp;#8221; come about. This post will also give us the opportunity to describe the process of running our custom &lt;a title=&quot;Kali Linux ARM image build scripts&quot; href=&quot;https://gitlab.com/kalilinux/build-scripts/kali-arm&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Kali Linux ARM build scripts&lt;/a&gt;, by way of a story. If you couldn&amp;#8217;t care less about this story, and just want the updated image &amp;#8211; head straight to our &lt;a href=&quot;https://manage.offsec.com/kali-linux-vm-vmware-virtualbox-image-download/&quot; title=&quot;Kali Linux Downloads&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Kali Linux Custom Image page&lt;/a&gt;!&lt;/p&gt;</description><pubDate>Mon, 27 Jan 2014 15:10:05 GMT</pubDate></item><item><title>Exploit Database Hosted on GitHub</title><link>https://www.offsec.com/blog/exploit-database-hosted-on-github/</link><guid isPermaLink="true">https://www.offsec.com/blog/exploit-database-hosted-on-github/</guid><description>&lt;p style=&quot;text-align: justify;&quot;&gt;We have recently completed some renovations on the Exploit Database backend systems and moved the EDB exploit repository to Github. This means that it&amp;#8217;s now easier than ever to copy, clone or fork the whole repository. The previous SVN CVS has been retired. &lt;/p&gt;</description><pubDate>Tue, 07 Jan 2014 14:38:52 GMT</pubDate></item><item><title>Bug Bounty Program Insights</title><link>https://www.offsec.com/blog/bug-bounty-program-insights/</link><guid isPermaLink="true">https://www.offsec.com/blog/bug-bounty-program-insights/</guid><description>&lt;p style=&quot;text-align: justify;&quot;&gt;With the nature of our business, we at Offensive Security take our system security very seriously and we appreciate the benefits of having &amp;#8220;the crowd&amp;#8221; scrutinize our internet presence for bugs. For this reason, we recently started our own &lt;a title=&quot;Bug Bounty Program&quot; href=&quot;https://manage.offsec.com/bug-bounty-program/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Bug Bounty Program&lt;/a&gt;, which provides incentives for researchers to inform us of possible vulnerabilities in our sites in exchange for cash rewards.&lt;/p&gt;</description><pubDate>Mon, 23 Dec 2013 14:07:40 GMT</pubDate></item><item><title>Penetration Testing with Kali Linux – Online Course Update</title><link>https://www.offsec.com/blog/penetration-testing-with-kali-linux-online-course-update/</link><guid isPermaLink="true">https://www.offsec.com/blog/penetration-testing-with-kali-linux-online-course-update/</guid><description>&lt;p style=&quot;text-align: justify&quot;&gt;Over a year ago, when we first sat down and began on what would become &lt;a href=&quot;https://www.kali.org/&quot; title=&quot;Kali Linux&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Kali Linux&lt;/a&gt;, we realized that with all the major changes, we would also need to update our flagship course, &lt;a href=&quot;https://manage.offsec.com/information-security-training/penetration-testing-training-kali-linux/&quot; title=&quot;Penetration Testing with BackTrack&quot;&gt;Penetration Testing with BackTrack&lt;/a&gt; (PWB), to be inline with Kali Linux. With the release of Kali, we ensured that we mentioned the impact this would have on PWB and that an update to the course was in the works.&lt;/p&gt;</description><pubDate>Thu, 19 Dec 2013 20:26:41 GMT</pubDate></item><item><title>NDPROXY Local SYSTEM exploit CVE-2013-5065</title><link>https://www.offsec.com/blog/ndproxy-local-system-exploit-cve-2013-5065/</link><guid isPermaLink="true">https://www.offsec.com/blog/ndproxy-local-system-exploit-cve-2013-5065/</guid><description>&lt;p style=&quot;text-align: justify;&quot;&gt;In the past few days there has been some online chatter about a new Windows XP/2k3 privilege escalation, well documented by &lt;a title=&quot;Fireeye&quot; href=&quot;http://www.fireeye.com/blog/technical/cyber-exploits/2013/11/ms-windows-local-privilege-escalation-zero-day-in-the-wild.html&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;FireEye&lt;/a&gt;. Googling around, we came across a Twitter message which contained a link to a Chinese vulnerability analysis and PoC.&lt;/p&gt;</description><pubDate>Wed, 04 Dec 2013 02:11:58 GMT</pubDate></item><item><title>Penetration Test Report 2013</title><link>https://www.offsec.com/blog/penetration-test-report-2013/</link><guid isPermaLink="true">https://www.offsec.com/blog/penetration-test-report-2013/</guid><description>&lt;p style=&quot;text-align: justify&quot;&gt;We are proud to release a new, updated, sample penetration test report. This report accurately reflects the types of assessments we conduct for our clients. It incorporates changes we have made over the last two years based on customer feedback, as well as reflecting many of the types of attacks we have found to be effective in multiple customer environments.&lt;/p&gt;</description><pubDate>Tue, 03 Sep 2013 14:57:58 GMT</pubDate></item><item><title>Kali Linux ISO of Doom</title><link>https://www.offsec.com/blog/kali-linux-iso-of-doom/</link><guid isPermaLink="true">https://www.offsec.com/blog/kali-linux-iso-of-doom/</guid><description>&lt;p style=&quot;text-align: justify;&quot;&gt;In our last blog post, we provided an example of running an &lt;a title=&quot;Kali Linux Unattended PXE Install&quot; href=&quot;https://manage.offsec.com/kali-linux/kali-linux-unattended-network-install-pxe/&quot;&gt;unattended network installation of Kali Linux&lt;/a&gt;. Our scenario covered the installation of a custom Kali configuration which contained select tools required for a remote vulnerability assessment using OpenVAS and the Metasploit Framework.&lt;/p&gt;</description><pubDate>Tue, 27 Aug 2013 11:36:21 GMT</pubDate></item><item><title>Kali Linux Unattended PXE Install</title><link>https://www.offsec.com/blog/kali-linux-unattended-network-install-pxe/</link><guid isPermaLink="true">https://www.offsec.com/blog/kali-linux-unattended-network-install-pxe/</guid><description>&lt;p style=&quot;text-align: justify;&quot;&gt;Our last blog post on the &lt;a href=&quot;https://www.kali.org/&quot; title=&quot;Kali Linux&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Kali Linux&lt;/a&gt; site discussed &lt;a href=&quot;https://www.kali.org/penetration-testing/kali-linux-penetration-testing-platform/&quot; title=&quot;Kali Linux Penetration Testing Platform&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;implementing some cool scenarios with Kali Linux&lt;/a&gt;, such as remote unattended installations, creating custom Kali Linux ISOS, and getting Kali working on &lt;a href=&quot;https://manage.offsec.com/kali-linux/kali-linux-on-galaxy-note/&quot; title=&quot;Kali Linux on a Galaxy Note 10.1&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;funky ARM hardware&lt;/a&gt;. We received several emails from people asking for more information on how to implement these scenarios, so we thought we&amp;#8217;d make a few blog posts with more detailed examples.&lt;/p&gt;</description><pubDate>Mon, 12 Aug 2013 11:00:53 GMT</pubDate></item><item><title>Kali Linux on a Galaxy Note 10.1</title><link>https://www.offsec.com/blog/kali-linux-on-galaxy-note/</link><guid isPermaLink="true">https://www.offsec.com/blog/kali-linux-on-galaxy-note/</guid><description>&lt;p style=&quot;text-align: justify;&quot;&gt;Here at Offsec, we love playing with hardware. Be it something like the &lt;a title=&quot;Onity Door Unlocker, Round Two.&quot; href=&quot;https://manage.offsec.com/offsec/onity-door-unlock-round-two/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Onity Hotel Door Unlocker&lt;/a&gt;, a &lt;a title=&quot;Advanced Teensy Penetration Testing Payloads&quot; href=&quot;https://manage.offsec.com/offsec/advanced-teensy-penetration-testing-payloads/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Teensy USB HID attack payload&lt;/a&gt;, or &lt;a title=&quot;Cloning RFID Tags with Proxmark 3&quot; href=&quot;https://manage.offsec.com/offsec/cloning-rfid-tags-with-proxmark-3/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;RFID hacks&lt;/a&gt; &amp;#8211; if it&amp;#8217;s shiny, we like it. While we were in the last stages of developing Kali Linux, we made the effort to to get Kali working on some ARM hardware, such as the &lt;a href=&quot;http://docs.kali.org/armel-armhf/install-kali-samsung-chromebook&quot; title=&quot;Kali Linux ARM Samsung Chromebook&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Samsung Chromebook&lt;/a&gt;, &lt;a href=&quot;http://docs.kali.org/armel-armhf/install-kali-linux-odroid-x2u2&quot; title=&quot;Kali Linux ARM Odroid U2&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Odroid U2&lt;/a&gt;, &lt;a href=&quot;http://docs.kali.org/armel-armhf/install-kali-linux-arm-raspberry-pi&quot; title=&quot;Kali Linux ARM Raspberry Pi&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Raspberry Pi&lt;/a&gt; and RK3306 devices such as the &lt;a href=&quot;http://docs.kali.org/armel-armhf/install-kali-arm-on-ss808&quot; title=&quot;Kali Linux ARM on SS808&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;SS808&lt;/a&gt;, and then contributed these to the community as &amp;#8220;Unofficial Trusted Images&amp;#8221;, together with the Official Kali Linux downloads.&lt;/p&gt;</description><pubDate>Tue, 02 Apr 2013 13:58:30 GMT</pubDate></item><item><title>Kali Linux Has Been Released!</title><link>https://www.offsec.com/blog/kali-linux-released/</link><guid isPermaLink="true">https://www.offsec.com/blog/kali-linux-released/</guid><description>&lt;p style=&quot;text-align: justify;&quot;&gt;Seven years of developing &lt;a href=&quot;http://www.backtrack-linux.org&quot; title=&quot;BackTrack Linux&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;BackTrack Linux&lt;/a&gt; has taught us a significant amount about what we, and the security community, think a penetration testing distribution should look like. We&amp;#8217;ve taken all of this knowledge and experience and implemented it in our &amp;#8220;next generation&amp;#8221; penetration testing distribution.&lt;/p&gt;</description><pubDate>Wed, 13 Mar 2013 07:00:18 GMT</pubDate></item><item><title>BackTrack Reborn – Kali Linux</title><link>https://www.offsec.com/blog/backtrack-reborn-kali-linux/</link><guid isPermaLink="true">https://www.offsec.com/blog/backtrack-reborn-kali-linux/</guid><description>It’s been 7 years since we released our first version of BackTrack Linux, and the ride so far has been exhilarating. When the dev team started talking about BackTrack 6 (almost a year ago), each of us put on paper a few “wish list goals” that we each wanted implemented in our “next version”. It</description><pubDate>Tue, 22 Jan 2013 11:40:42 GMT</pubDate></item><item><title>Yahoo DOM XSS 0day – Not fixed yet!</title><link>https://www.offsec.com/blog/yahoo-dom-xss-0day-prevails/</link><guid isPermaLink="true">https://www.offsec.com/blog/yahoo-dom-xss-0day-prevails/</guid><description>After discussing the recent Yahoo DOM XSS 0day with Shahin from Abysssec.com, it was discovered that Yahoo&amp;#8217;s fix set in place on 6:20 PM EST, Jan 7th, 2013 is not effective as one would hope.</description><pubDate>Tue, 08 Jan 2013 16:59:49 GMT</pubDate></item><item><title>Fun with AIX Shellcode and Metasploit</title><link>https://www.offsec.com/blog/aix-shellcode-metasploit/</link><guid isPermaLink="true">https://www.offsec.com/blog/aix-shellcode-metasploit/</guid><description>In one of our recent pentests, we discovered an 0day for a custom C application server running on the AIX Operating System. After debugging the crash, we discovered that the bug could lead to remote code execution and since we don&amp;#8217;t deal very often with AIX exploitation, we decided to write an exploit for it. The first steps were accomplished pretty quickly and we successfully diverted the execution flow by jumping to a controlled buffer. At this point, we thought we could easily generate some shellcode from MSF and enjoy our remote shell.</description><pubDate>Tue, 20 Nov 2012 13:53:50 GMT</pubDate></item><item><title>CA ARCserve – CVE-2012-2971</title><link>https://www.offsec.com/blog/ca-arcserve-rwslist-remote-code-execution/</link><guid isPermaLink="true">https://www.offsec.com/blog/ca-arcserve-rwslist-remote-code-execution/</guid><description>On a recent penetration test, we encountered an installation of CA ARCserve Backup on one of the target systems that piqued our interest. Like most &amp;#8220;good&amp;#8221; enterprise applications, ARCserve has processes that are running as SYSTEM so naturally, we went straight to work looking for vulnerabilities.</description><pubDate>Tue, 30 Oct 2012 18:12:27 GMT</pubDate></item><item><title>Onity Door Unlocker, Round Two.</title><link>https://www.offsec.com/blog/onity-door-unlock-round-two/</link><guid isPermaLink="true">https://www.offsec.com/blog/onity-door-unlock-round-two/</guid><description>On one of our engagements, we figured an Onity Hotel door unlocker would be useful to us. Inspired by the &amp;#8220;James Bond&amp;#8221; type setup we saw on the Spiderlabs blog post, we thought we&amp;#8217;de try to build a small, simple and &amp;#8220;TSA friendly&amp;#8221; version of the Onity key unlocker.</description><pubDate>Tue, 23 Oct 2012 15:45:33 GMT</pubDate></item><item><title>Stand-Alone EM4x RFID Harvester</title><link>https://www.offsec.com/blog/stand-alone-em4x-rfid-harvester/</link><guid isPermaLink="true">https://www.offsec.com/blog/stand-alone-em4x-rfid-harvester/</guid><description>Continuing off from our last RFID Cloning with Proxmark3 post, we wanted to build a small, portable, stand-alone EM4x RFID tag stealer. We needed an easy way of storing multiple tag IDs whilst &amp;#8220;rubbing elbows&amp;#8221; with company personnel. The proxmark3 seemed liked an overkill and not particularly fast at reading em4x tags so we figured we&amp;#8217;d try hooking up our RoboticsConnection RFID reader to a Teensy and see if we could make them play nicely together.</description><pubDate>Thu, 27 Sep 2012 14:40:40 GMT</pubDate></item><item><title>RFID Cloning with Proxmark 3</title><link>https://www.offsec.com/blog/rfid-cloning-with-proxmark/</link><guid isPermaLink="true">https://www.offsec.com/blog/rfid-cloning-with-proxmark/</guid><description>Our Proxmark 3 (and antennae) finally arrived, and we thought we’d take it for a spin. It’s a great little device for physical pentests, allowing us to capture, replay and clone certain RFID tags.</description><pubDate>Mon, 24 Sep 2012 09:30:20 GMT</pubDate></item><item><title>Offsec BlackHat / Defcon Scavenger Hunt</title><link>https://www.offsec.com/blog/offsec-vegas-scavenger-hunt/</link><guid isPermaLink="true">https://www.offsec.com/blog/offsec-vegas-scavenger-hunt/</guid><description>Are you in Vegas for BlackHat and Defcon ? Are you desperately looking for Offensive Security schwag ? We are giving out Metasploit books, BackTrack Challenge coins and large sized BackTrack Decals in this years BlackHat and Defcon conferences.
So, what exactly does one need to do to get these wonderful, sought after gifts ? It&amp;#8217;s easy:</description><pubDate>Tue, 24 Jul 2012 04:51:12 GMT</pubDate></item><item><title>FreePBX Exploit Phone Home</title><link>https://www.offsec.com/blog/freepbx-exploit-phone-home/</link><guid isPermaLink="true">https://www.offsec.com/blog/freepbx-exploit-phone-home/</guid><description>During a routine scan of new vulnerability reports for the Exploit Database, we came across a single post in full disclosure by Martin Tschirsich, about a Remote Code Execution vulnerability in FreePBX. This vulnerability sounded intriguing, and as usual, required verification in the EDB. At first glance, the vulnerability didn&amp;#8217;t jump out at us, especially as we are not familiar with the inner workings of asterisk. After a couple of emails back and forth with Martin, the path to code execution became clearer:</description><pubDate>Fri, 23 Mar 2012 05:44:37 GMT</pubDate></item><item><title>Announcing the OSEE Certification</title><link>https://www.offsec.com/blog/announcing-the-awe-osee-certification/</link><guid isPermaLink="true">https://www.offsec.com/blog/announcing-the-awe-osee-certification/</guid><description>Since the inception of our Advanced Windows Exploitation (AWE) course, our students (who are always searching for more pain) have been asking for an accompanying certification exam. We are very pleased to announce the launch of the Offensive Security Exploit Expert (OSEE) certification.</description><pubDate>Mon, 16 Jan 2012 21:48:52 GMT</pubDate></item><item><title>PWB in the Caribbean, Part 3</title><link>https://www.offsec.com/blog/pwb-in-the-caribbean-part-3/</link><guid isPermaLink="true">https://www.offsec.com/blog/pwb-in-the-caribbean-part-3/</guid><description>In Part 2 of our series of posts on the recent PWB in the Caribbean course, Johnny was desperately seeking an exit from the upcoming pain that is exploit development. However, he didn&amp;#8217;t come up with an escape plan quickly enough and his tale continues in this latest diary entry.</description><pubDate>Wed, 28 Dec 2011 00:58:07 GMT</pubDate></item><item><title>PWB in the Caribbean, Part 2</title><link>https://www.offsec.com/blog/pwb-in-the-caribbean-part-2/</link><guid isPermaLink="true">https://www.offsec.com/blog/pwb-in-the-caribbean-part-2/</guid><description>In our ongoing series covering our most recent live PWB in the Caribbean course, Johnny picks up from Part 1 and provides an inside and personal look at the course as it picks up speed and increases in difficulty.</description><pubDate>Wed, 21 Dec 2011 08:30:26 GMT</pubDate></item><item><title>Offensive Security Wireless Attacks Updated</title><link>https://www.offsec.com/blog/offensive-security-wireless-attacks-updated/</link><guid isPermaLink="true">https://www.offsec.com/blog/offensive-security-wireless-attacks-updated/</guid><description>At long last, our highly rated Wireless Attacks Course (Wi-Fu) has been updated to version 3! This is a major revision of the course with a complete restructure and redesign of the course content with a far broader range of attack techniques.</description><pubDate>Wed, 07 Dec 2011 01:00:02 GMT</pubDate></item><item><title>MS11-080 Exploit – A Voyage into Ring Zero</title><link>https://www.offsec.com/blog/ms11-080-voyage-into-ring-zero/</link><guid isPermaLink="true">https://www.offsec.com/blog/ms11-080-voyage-into-ring-zero/</guid><description>Every patch Tuesday, we, like many in the security industry, love to analyze the released patches and see if any of them can lead to the development of a working exploit. Recently, the MS11-080 advisory caught our attention as it afforded us the opportunity to play in the kernel and try to get a working privilege escalation exploit out of it.</description><pubDate>Tue, 06 Dec 2011 01:00:27 GMT</pubDate></item><item><title>Advanced Windows Exploitation Updated</title><link>https://www.offsec.com/blog/advanced-windows-exploitation-updated/</link><guid isPermaLink="true">https://www.offsec.com/blog/advanced-windows-exploitation-updated/</guid><description>Our Advanced Windows Exploitation (AWE) live course in Columbia, Maryland is fast approaching with a start-date of October 24. Not only is the first time we have offered this training outside of BlackHat, it is also the first time we are able to offer a full 5 days of training and a limited number of seats are still available for this intense course.</description><pubDate>Wed, 12 Oct 2011 15:38:24 GMT</pubDate></item><item><title>Metasploit: A Penetration Testers Guide</title><link>https://www.offsec.com/blog/metasploit-a-penetration-testers-guide/</link><guid isPermaLink="true">https://www.offsec.com/blog/metasploit-a-penetration-testers-guide/</guid><description>Offensive Security is happy to announce the availability of Metasploit, The Penetration Tester&amp;#8217;s Guide &amp;#8211; A new book by Dave Kennedy (ReL1K), Devon Kearns (dookie), Jim O&amp;#8217;Gorman (_Elwood_), and Mati Aharoni (muts). The book is released through No Starch Press.</description><pubDate>Tue, 12 Jul 2011 05:00:09 GMT</pubDate></item><item><title>MSFU Updates – June 2011</title><link>https://www.offsec.com/blog/msfu-updates-june-2011/</link><guid isPermaLink="true">https://www.offsec.com/blog/msfu-updates-june-2011/</guid><description>Over this past month, we have put a great deal of time into bringing our free online course, Metasploit Unleashed in line with BackTrack 5. The majority of these changes are cosmetic in nature but they should help to reduce confusion for newcomers to Metasploit and BackTrack while ensuring a consistent look throughout. We have also taken this opportunity to do more functionality verification in the course.</description><pubDate>Thu, 16 Jun 2011 13:14:23 GMT</pubDate></item><item><title>MSFU Updates – May 2011</title><link>https://www.offsec.com/blog/msfu-updates-may-2011/</link><guid isPermaLink="true">https://www.offsec.com/blog/msfu-updates-may-2011/</guid><description>This month, even with the rampant development and release of BackTrack 5, we still devoted some time to updating Metasploit Unleashed. The Metasploit team is making a great deal of progress switching over to post-exploitation modules so we focused entirely on them this month and added many to the Metasploit Module Reference section.</description><pubDate>Mon, 16 May 2011 09:25:29 GMT</pubDate></item><item><title>MSFU Updates – April 2011</title><link>https://www.offsec.com/blog/msfu-updates-april-2011/</link><guid isPermaLink="true">https://www.offsec.com/blog/msfu-updates-april-2011/</guid><description>This past month has seen more additions to our free Metasploit Unleashed training course, primarily in our on-going effort to build out the Metasploit Module Reference section. Also, with the Metasploit team moving away from meterpreter scripts in favor of post-exploitation modules, we have been updating the relevant sections of MSFU.</description><pubDate>Mon, 18 Apr 2011 11:29:17 GMT</pubDate></item><item><title>Discover your inner Pirate</title><link>https://www.offsec.com/blog/discover-your-inner-pirate/</link><guid isPermaLink="true">https://www.offsec.com/blog/discover-your-inner-pirate/</guid><description>For the last two years Offensive Security has been taking the live training market by storm with its flagship course, Pentesting with BackTrack. We are very excited to announce that the next PWB live training will be held in an exotic location the Caribbean island of St. Kitts and Nevis.</description><pubDate>Thu, 14 Apr 2011 11:33:06 GMT</pubDate></item><item><title>BackTrack 5 on a Motorola Xoom</title><link>https://www.offsec.com/blog/backtrack-5-on-a-motorola-xoom/</link><guid isPermaLink="true">https://www.offsec.com/blog/backtrack-5-on-a-motorola-xoom/</guid><description>In the past few days we have been toying with some Motorola hardware, and have managed to get a basic build of BackTrack 5 (+ toolchain) on a Motorola Xoom. The possibilities look exciting as we are slowly building several experimental arm packages. Our team does not have much experience with the Android OS nor ARM hardware, but so far &amp;#8211; so good. We will not promise an ARM release on May 10th, as this new &amp;#8220;experiment&amp;#8221; was not planned in any way &amp;#8211; but we&amp;#8217;ll do our best.</description><pubDate>Tue, 12 Apr 2011 16:33:34 GMT</pubDate></item><item><title>MSFU Updates – March 2011</title><link>https://www.offsec.com/blog/msfu-updates-march-2011/</link><guid isPermaLink="true">https://www.offsec.com/blog/msfu-updates-march-2011/</guid><description>This past month has seen more additions to our free Metasploit Unleashed training course, primarily in our on-going effort to build out the Metasploit Module Reference section. At the same time, we are still continuing to work through the course content to ensure that it is still all functional.</description><pubDate>Tue, 15 Mar 2011 10:59:42 GMT</pubDate></item><item><title>MSFU Updates – February 2011</title><link>https://www.offsec.com/blog/msfu-updates-february-2011/</link><guid isPermaLink="true">https://www.offsec.com/blog/msfu-updates-february-2011/</guid><description>This past month has seen a number of additions to our free Metasploit Unleashed training course, primarily in our on-going effort to build out the Metasploit Module Reference section. In addition, we are still continuing to work through the course content to ensure that it is still all functional.</description><pubDate>Tue, 15 Feb 2011 09:05:34 GMT</pubDate></item><item><title>MSFU Updates – January 2011</title><link>https://www.offsec.com/blog/msfu-updates-january-2011/</link><guid isPermaLink="true">https://www.offsec.com/blog/msfu-updates-january-2011/</guid><description>This past month has seen a number of additions to our free Metasploit Unleashed training course, primarily in our on-going effort to build out the Metasploit Module Reference section. The Metasploit team has been developing at a rapid pace with new features and modules being frequently added. We are also continuing to go through the course content itself and verify the functionality of the provided material.</description><pubDate>Mon, 17 Jan 2011 10:35:01 GMT</pubDate></item><item><title>The Art of Human Hacking</title><link>https://www.offsec.com/blog/art-human-hacking/</link><guid isPermaLink="true">https://www.offsec.com/blog/art-human-hacking/</guid><description>It&amp;#8217;s hard to believe that the social-engineer.org project began 14 months ago. This project started from a simple idea ­ to build the world&amp;#8217;s first framework for social engineers. In these 14 months, this project has grown into the leading resource for all real social engineering education. The CTF that we held at Defcon 18 proved beyond doubt that this resource was greatly required.</description><pubDate>Sun, 19 Dec 2010 18:39:24 GMT</pubDate></item><item><title>MSFU Updates – December 2010</title><link>https://www.offsec.com/blog/msfu-updates-december-2010/</link><guid isPermaLink="true">https://www.offsec.com/blog/msfu-updates-december-2010/</guid><description>This month we have again been steadily updating the Metasploit Module Reference section of Metasploit Unleashed and also added some great new content covering the setup and usage of databases with Metasploit under BackTrack4 R2. This month also saw the introduction of the excellent GUI front-end, Armitage.</description><pubDate>Wed, 15 Dec 2010 09:50:55 GMT</pubDate></item><item><title>Metasploit Pro Added to the PWB Labs</title><link>https://www.offsec.com/blog/metasploit-pro-added-to-the-pwb-labs/</link><guid isPermaLink="true">https://www.offsec.com/blog/metasploit-pro-added-to-the-pwb-labs/</guid><description>We are very happy to announce that our Penetration Testing with BackTrack online labs now include installations of Metasploit Pro. Deep within our lab network, students who Try Harder™ will encounter credentials for these installations that will allow them to enjoy the use of a tool that simplifies many of the tasks that they had to perform manually.</description><pubDate>Mon, 13 Dec 2010 08:44:22 GMT</pubDate></item><item><title>Godaddy Workspace XSS – Who’s your Daddy ?</title><link>https://www.offsec.com/blog/godaddy-xss-exploit/</link><guid isPermaLink="true">https://www.offsec.com/blog/godaddy-xss-exploit/</guid><description>An interesting submission in from the Exploit Database &amp;#8211; a Godaddy workspace XSS vulnerability. Although we did not post it (live site), the vulnerability seems real, and definitely worth mentioning.
</description><pubDate>Sat, 11 Dec 2010 11:12:27 GMT</pubDate></item><item><title>Armitage in BackTrack 4 r2</title><link>https://www.offsec.com/blog/armitage-in-backtrack-4-r2/</link><guid isPermaLink="true">https://www.offsec.com/blog/armitage-in-backtrack-4-r2/</guid><description>A brief time ago, an exciting GUI front-end for Metasploit named Armitage was released. For being an initial release, Armitage is very polished and so we knew we had to add it to the BackTrack respositories.</description><pubDate>Mon, 29 Nov 2010 14:43:23 GMT</pubDate></item><item><title>Metasploit with MySQL in BackTrack 4 r2</title><link>https://www.offsec.com/blog/metasploit-with-mysql-in-backtrack-4-r2/</link><guid isPermaLink="true">https://www.offsec.com/blog/metasploit-with-mysql-in-backtrack-4-r2/</guid><description>Until the release of BackTrack 4 r2, it was possible to get Metasploit working with MYSQL but it was not an altogether seamless experience. Now, however, Metasploit and MYSQL work together &amp;#8220;out of the box&amp;#8221; so we thought it would be great to highlight the integration. With the Metasploit team moving away from sqlite3, it is vital to be able to make use of a properly threaded database. There have also been quite a number of additional database commands added to Metasploit and documentation tends to be rather sparse online when it comes to the less &amp;#8220;glamorous&amp;#8221; side of database management.</description><pubDate>Sun, 21 Nov 2010 22:42:56 GMT</pubDate></item><item><title>MSFU Updates – November 2010</title><link>https://www.offsec.com/blog/msfu-updates-november-2010/</link><guid isPermaLink="true">https://www.offsec.com/blog/msfu-updates-november-2010/</guid><description>This past month has been busy yet we have been steadily updating the free Metasploit Unleashed Training course with the largest growing area being the Module Reference section. This month has also seen updates to the Fast-Track and Social-Engineer Toolkit sections of the wiki.</description><pubDate>Mon, 15 Nov 2010 17:33:58 GMT</pubDate></item><item><title>Winamp 5.58 Exploit Development</title><link>https://www.offsec.com/blog/winamp-5-58-exploit-development/</link><guid isPermaLink="true">https://www.offsec.com/blog/winamp-5-58-exploit-development/</guid><description>The guys at the Exploit Database posted an awesome writeup on a Winamp 5.58 Exploit Development storming session &amp;#8211; with some really cool results. In the end, they ended up writing a short assembly sequence to walk through the payload and replace bad characters with original shellcode bytes. </description><pubDate>Wed, 27 Oct 2010 14:31:21 GMT</pubDate></item><item><title>Adobe Shockwave player rcsL chunk memory corruption 0day</title><link>https://www.offsec.com/blog/adobe-shockwave-player-rcsl-chunk-memory-corruption-0day/</link><guid isPermaLink="true">https://www.offsec.com/blog/adobe-shockwave-player-rcsl-chunk-memory-corruption-0day/</guid><description>Adobe Shockwave player rcsL chunk memory corruption 0day demonstration and video</description><pubDate>Thu, 21 Oct 2010 11:33:33 GMT</pubDate></item><item><title>Metasploit Unleashed, Again!</title><link>https://www.offsec.com/blog/msfu-update/</link><guid isPermaLink="true">https://www.offsec.com/blog/msfu-update/</guid><description>Metasploit Unleashed &amp;#8211; new wiki with updated materials</description><pubDate>Wed, 06 Oct 2010 22:46:14 GMT</pubDate></item><item><title>Metasploit Unleashed – Updates</title><link>https://www.offsec.com/blog/metasploit-unleashed-updates/</link><guid isPermaLink="true">https://www.offsec.com/blog/metasploit-unleashed-updates/</guid><description>Updates to the Metasploit Unleashed Free online Training course, by Offensive Security.</description><pubDate>Thu, 26 Aug 2010 14:25:59 GMT</pubDate></item><item><title>Metasploit 3.4 and SET 0.6.1 on iPhone 4</title><link>https://www.offsec.com/blog/metasploit-3-4-and-set-on-iphone-4/</link><guid isPermaLink="true">https://www.offsec.com/blog/metasploit-3-4-and-set-on-iphone-4/</guid><description>Installing metasploit and social engineering toolkit SET on iPhone 4</description><pubDate>Sat, 07 Aug 2010 23:00:35 GMT</pubDate></item><item><title>BlackHat, BackTrack and EDB Updates</title><link>https://www.offsec.com/blog/backtrack-4-r1-exploitdb-blackhat-vegas/</link><guid isPermaLink="true">https://www.offsec.com/blog/backtrack-4-r1-exploitdb-blackhat-vegas/</guid><description>Updates from BlackHat, BackTrack Exploit-Database, Social-engineer.org and more!</description><pubDate>Sat, 07 Aug 2010 14:09:06 GMT</pubDate></item><item><title>How to Update to BackTrack 2.6.34</title><link>https://www.offsec.com/blog/how-to-update-backtrack-2-6-34/</link><guid isPermaLink="true">https://www.offsec.com/blog/how-to-update-backtrack-2-6-34/</guid><description>Howto Update BackTrack to the latest Kernel 2.6.34</description><pubDate>Mon, 05 Jul 2010 10:38:02 GMT</pubDate></item><item><title>BackTrack ISO Kernel 2.6.34 Upgrade</title><link>https://www.offsec.com/blog/backtrack-kernel-upgrade-2-6-34/</link><guid isPermaLink="true">https://www.offsec.com/blog/backtrack-kernel-upgrade-2-6-34/</guid><description>BackTrack ISO Kernel 2.6.34 Upgrade</description><pubDate>Fri, 02 Jul 2010 10:53:41 GMT</pubDate></item><item><title>How to Hack your Way to BlackHat Vegas</title><link>https://www.offsec.com/blog/how-to-hack-your-way-to-blackhat-vegas/</link><guid isPermaLink="true">https://www.offsec.com/blog/how-to-hack-your-way-to-blackhat-vegas/</guid><description>Cyber Hacking Challenge &amp;#8211; HSIYF 2 by Offensive Security</description><pubDate>Thu, 24 Jun 2010 10:02:02 GMT</pubDate></item><item><title>Penetration Testing Tools</title><link>https://www.offsec.com/blog/penetration-testing-tools/</link><guid isPermaLink="true">https://www.offsec.com/blog/penetration-testing-tools/</guid><description>Penetration Testing Tools for BackTrack 4 R1 &amp;#8211; Submit your idea today!</description><pubDate>Thu, 24 Jun 2010 10:00:29 GMT</pubDate></item><item><title>Evocam Remote Buffer Overflow on OSX</title><link>https://www.offsec.com/blog/evocam-remote-buffer-overflow-on-osx/</link><guid isPermaLink="true">https://www.offsec.com/blog/evocam-remote-buffer-overflow-on-osx/</guid><description>A tutorial on the Evocam Remote Buffer Overflow on OSX 10.5.8</description><pubDate>Fri, 04 Jun 2010 11:38:41 GMT</pubDate></item><item><title>Hacking Challenge #2 – HSIYF for Charity</title><link>https://www.offsec.com/blog/cyber-hacking-challenge-2-hsiyf-for-charity/</link><guid isPermaLink="true">https://www.offsec.com/blog/cyber-hacking-challenge-2-hsiyf-for-charity/</guid><description>HFC Cyber Hacking Challenge &amp;#8211; How strong is your Fu for charity?</description><pubDate>Wed, 26 May 2010 19:57:21 GMT</pubDate></item><item><title>BackTrack 4 R1 Dev Public Release</title><link>https://www.offsec.com/blog/penetration-testing-information-security-distribution/</link><guid isPermaLink="true">https://www.offsec.com/blog/penetration-testing-information-security-distribution/</guid><description>The best information security distribution for penetration testing and security audits. Help us test the R1 Development release.</description><pubDate>Mon, 10 May 2010 08:23:59 GMT</pubDate></item><item><title>BackTrack 4 Release 1 (R1 Dev)</title><link>https://www.offsec.com/blog/information-security-distribution/</link><guid isPermaLink="true">https://www.offsec.com/blog/information-security-distribution/</guid><description>The leading Information Security and Penetration Testing Distribution</description><pubDate>Wed, 05 May 2010 11:03:52 GMT</pubDate></item><item><title>Malicious Google Gadgets in Action</title><link>https://www.offsec.com/blog/malicious-google-gadgets-in-action/</link><guid isPermaLink="true">https://www.offsec.com/blog/malicious-google-gadgets-in-action/</guid><description>Malicious Google Gadgets in Action Video &amp;#8211; by Offensive Security</description><pubDate>Mon, 03 May 2010 18:46:20 GMT</pubDate></item><item><title>Penetration Testing in the Real World</title><link>https://www.offsec.com/blog/penetration-testing-in-the-real-world/</link><guid isPermaLink="true">https://www.offsec.com/blog/penetration-testing-in-the-real-world/</guid><description>Penetration Testing video by Offensive Security &amp;#8211; Real world scenario.</description><pubDate>Tue, 27 Apr 2010 08:12:34 GMT</pubDate></item><item><title>How Strong is Your Fu?</title><link>https://www.offsec.com/blog/how-strong-is-your-fu/</link><guid isPermaLink="true">https://www.offsec.com/blog/how-strong-is-your-fu/</guid><description>Offensive Security Holds first Hacking Tournament &amp;#8211; How strong is Your Fu?</description><pubDate>Tue, 20 Apr 2010 13:54:28 GMT</pubDate></item><item><title>Return Oriented Exploitation (ROP)</title><link>https://www.offsec.com/blog/return-oriented-exploitation-rop/</link><guid isPermaLink="true">https://www.offsec.com/blog/return-oriented-exploitation-rop/</guid><description>For all those who registered to AWE in BlackHat Vegas 2010 – we have special surprise for you… We’ve updated our “Bypassing NX” module with the buzzing ROP exploitation method.</description><pubDate>Mon, 12 Apr 2010 18:53:06 GMT</pubDate></item><item><title>PHP 6.0 Dev str_transliterate() 0Day Buffer Overflow Exploit</title><link>https://www.offsec.com/blog/php-6-0-dev-str_transliterate-0day-buffer-overflow-exploit/</link><guid isPermaLink="true">https://www.offsec.com/blog/php-6-0-dev-str_transliterate-0day-buffer-overflow-exploit/</guid><description>An interesting submission to EDB today from the guys at http://www.nullbyte.org.il &amp;#8211; a PHP 6.0 0day buffer overflow.</description><pubDate>Mon, 05 Apr 2010 08:16:04 GMT</pubDate></item><item><title>Penetration Testing With BackTrack v.3.0 Alive!</title><link>https://www.offsec.com/blog/penetration-testing-with-backtrack-v-3-0-alive/</link><guid isPermaLink="true">https://www.offsec.com/blog/penetration-testing-with-backtrack-v-3-0-alive/</guid><description>The Online Security Training course &amp;#8211; Penetration Testing with BackTrack &amp;#8211; has been updated. </description><pubDate>Sat, 20 Mar 2010 20:00:57 GMT</pubDate></item><item><title>QuickZip Stack BOF : A box of chocolates – part 2</title><link>https://www.offsec.com/blog/quickzip-stack-bof-a-box-of-chocolates-part-2/</link><guid isPermaLink="true">https://www.offsec.com/blog/quickzip-stack-bof-a-box-of-chocolates-part-2/</guid><description>QuickZip stack overflow walkthrough part 2</description><pubDate>Mon, 15 Mar 2010 11:11:40 GMT</pubDate></item><item><title>PWB v3.0 – Offensive Security Online Training at its Best</title><link>https://www.offsec.com/blog/pwb-v3-information-security-training-at-its-best/</link><guid isPermaLink="true">https://www.offsec.com/blog/pwb-v3-information-security-training-at-its-best/</guid><description>Our flagship course, Penetration Testing with BackTrack is about to go to v3.0</description><pubDate>Thu, 11 Mar 2010 19:10:38 GMT</pubDate></item><item><title>QuickZip Stack BOF 0day: a box of chocolates</title><link>https://www.offsec.com/blog/quickzip-stack-bof-0day-a-box-of-chocolates/</link><guid isPermaLink="true">https://www.offsec.com/blog/quickzip-stack-bof-0day-a-box-of-chocolates/</guid><description>QuickZip stack overflow walkthrough part 1</description><pubDate>Sun, 07 Mar 2010 11:09:00 GMT</pubDate></item><item><title>PWB V.3.0 Available March 21st, 2010</title><link>https://www.offsec.com/blog/pwb-v-3-0-available-march-21st-2010/</link><guid isPermaLink="true">https://www.offsec.com/blog/pwb-v-3-0-available-march-21st-2010/</guid><description>Pentesting with BackTrack (PWB) version 3 available</description><pubDate>Fri, 26 Feb 2010 16:25:56 GMT</pubDate></item><item><title>Multiple Media Player HTTP DataHandler Overflow</title><link>https://www.offsec.com/blog/multiple-media-player-http-datahandler-overflow/</link><guid isPermaLink="true">https://www.offsec.com/blog/multiple-media-player-http-datahandler-overflow/</guid><description>Multiple Media Player HTTP DataHandler Overflow submitted to Exploit-db.</description><pubDate>Fri, 15 Jan 2010 11:55:22 GMT</pubDate></item><item><title>Pentesting With BackTrack v.3.0</title><link>https://www.offsec.com/blog/pentesting-with-backtrack-v-3-0/</link><guid isPermaLink="true">https://www.offsec.com/blog/pentesting-with-backtrack-v-3-0/</guid><description>Pentesting With BackTrack v.3.0</description><pubDate>Wed, 13 Jan 2010 15:14:52 GMT</pubDate></item><item><title>BackTrack 4 Final Release</title><link>https://www.offsec.com/blog/backtrack-4-final-release/</link><guid isPermaLink="true">https://www.offsec.com/blog/backtrack-4-final-release/</guid><description>BackTrack Linux version 4 released</description><pubDate>Mon, 11 Jan 2010 15:21:23 GMT</pubDate></item><item><title>Exploit-DB Updates</title><link>https://www.offsec.com/blog/exploit-db-updates/</link><guid isPermaLink="true">https://www.offsec.com/blog/exploit-db-updates/</guid><description>Exploit Database updated with OSVDB, CVE, Firefox toolbar and SVN functionality</description><pubDate>Thu, 03 Dec 2009 16:27:28 GMT</pubDate></item><item><title>Explo.it – The Day After</title><link>https://www.offsec.com/blog/exploit-the-day-after/</link><guid isPermaLink="true">https://www.offsec.com/blog/exploit-the-day-after/</guid><description>The Exploit Database now online.</description><pubDate>Tue, 17 Nov 2009 14:19:47 GMT</pubDate></item><item><title>Offensive Security Exploit Archive Online</title><link>https://www.offsec.com/blog/offensive-security-exploit-archive-online/</link><guid isPermaLink="true">https://www.offsec.com/blog/offensive-security-exploit-archive-online/</guid><description>Offensive Security Exploit Database, as well as Vulnerable applications is now Online</description><pubDate>Mon, 16 Nov 2009 11:40:42 GMT</pubDate></item><item><title>Metasploit Unleashed Back Online</title><link>https://www.offsec.com/blog/metasploit-unleashed-back-online/</link><guid isPermaLink="true">https://www.offsec.com/blog/metasploit-unleashed-back-online/</guid><description>Metasploit Unleashed Back Online</description><pubDate>Wed, 11 Nov 2009 18:08:41 GMT</pubDate></item><item><title>Offsec Web Server Hacked</title><link>https://www.offsec.com/blog/offsec-web-server-hacked/</link><guid isPermaLink="true">https://www.offsec.com/blog/offsec-web-server-hacked/</guid><description>Offsec web server hacked, detected, and stopped</description><pubDate>Sun, 08 Nov 2009 21:58:06 GMT</pubDate></item><item><title>Metasploit Rising</title><link>https://www.offsec.com/blog/metasploit-rising/</link><guid isPermaLink="true">https://www.offsec.com/blog/metasploit-rising/</guid><description>Metasploit purchased by Rapid7</description><pubDate>Wed, 21 Oct 2009 12:08:32 GMT</pubDate></item><item><title>Free Information Security Training By Offensive Security</title><link>https://www.offsec.com/blog/free-online-information-security-training-by-offensive-security/</link><guid isPermaLink="true">https://www.offsec.com/blog/free-online-information-security-training-by-offensive-security/</guid><description>We are finally ready to present the free information security training – Metasploit Unleashed (MSFU) – Mastering the Framework.</description><pubDate>Mon, 21 Sep 2009 16:57:13 GMT</pubDate></item><item><title>Sniffing DECT Phones – The Details</title><link>https://www.offsec.com/blog/sniffing-dect-phones-the-details/</link><guid isPermaLink="true">https://www.offsec.com/blog/sniffing-dect-phones-the-details/</guid><description>Sniffing DECT phones video demonstration</description><pubDate>Thu, 17 Sep 2009 15:53:43 GMT</pubDate></item><item><title>Sniffing DECT Phones with BackTrack</title><link>https://www.offsec.com/blog/sniffing-dect-phones/</link><guid isPermaLink="true">https://www.offsec.com/blog/sniffing-dect-phones/</guid><description>Sniffing DECT Phones with BackTrack</description><pubDate>Thu, 10 Sep 2009 15:44:04 GMT</pubDate></item><item><title>Metasploit Unleashed – Information Security Training at its best.</title><link>https://www.offsec.com/blog/metasploit-unleashed-information-security-training-at-its-best/</link><guid isPermaLink="true">https://www.offsec.com/blog/metasploit-unleashed-information-security-training-at-its-best/</guid><description>Metasploit Unleashed &amp;#8211; Information Security Training at its best.</description><pubDate>Tue, 08 Sep 2009 14:49:38 GMT</pubDate></item><item><title>Microsoft IIS FTP  5.0 Remote SYSTEM Exploit</title><link>https://www.offsec.com/blog/microsoft-iis-ftp-5-0-remote-system-exploit/</link><guid isPermaLink="true">https://www.offsec.com/blog/microsoft-iis-ftp-5-0-remote-system-exploit/</guid><description>Microsoft IIS FTP 5.0 remote SYSTEM exploit video demonstration </description><pubDate>Mon, 31 Aug 2009 20:05:14 GMT</pubDate></item><item><title>BackTrack 4 Pre Final Kernel Update</title><link>https://www.offsec.com/blog/backtrack-4-pre-final-kernel-update/</link><guid isPermaLink="true">https://www.offsec.com/blog/backtrack-4-pre-final-kernel-update/</guid><description>BackTrack 4 Pre Final kernel update</description><pubDate>Sun, 30 Aug 2009 03:09:53 GMT</pubDate></item><item><title>Kernel whoops in BackTrack 4</title><link>https://www.offsec.com/blog/kernel-whoops-in-backtrack-4/</link><guid isPermaLink="true">https://www.offsec.com/blog/kernel-whoops-in-backtrack-4/</guid><description>Linux Kernel &amp;#8216;sock_sendpage()&amp;#8217; NULL Pointer Dereference vulnerability patched in BackTrack 4</description><pubDate>Sun, 16 Aug 2009 19:58:44 GMT</pubDate></item><item><title>Metasploit Unleashed – Mastering the Framework</title><link>https://www.offsec.com/blog/metasploit-unleashed-mastering-the-framework/</link><guid isPermaLink="true">https://www.offsec.com/blog/metasploit-unleashed-mastering-the-framework/</guid><description>Metasploit Unleashed &amp;#8211; Mastering the Framework</description><pubDate>Wed, 15 Jul 2009 23:22:35 GMT</pubDate></item><item><title>Social Engineering Contest – Defcon 2009</title><link>https://www.offsec.com/blog/social-engineering-contest-defcon-2009/</link><guid isPermaLink="true">https://www.offsec.com/blog/social-engineering-contest-defcon-2009/</guid><description>Social Engineering Contest &amp;#8211; Defcon 2009</description><pubDate>Thu, 09 Jul 2009 00:57:25 GMT</pubDate></item><item><title>BackTrack 4 Pre Final – Feel the pwnsauce!</title><link>https://www.offsec.com/blog/backtrack-4-pwnsauce/</link><guid isPermaLink="true">https://www.offsec.com/blog/backtrack-4-pwnsauce/</guid><description>BackTrack 4 Pre Final download statistics</description><pubDate>Sat, 04 Jul 2009 02:54:01 GMT</pubDate></item><item><title>Holy Crack!</title><link>https://www.offsec.com/blog/backtrack-cuda-guide/</link><guid isPermaLink="true">https://www.offsec.com/blog/backtrack-cuda-guide/</guid><description>BackTrack 4 CUDA password cracking guide</description><pubDate>Sat, 27 Jun 2009 06:36:45 GMT</pubDate></item><item><title>Installing VMWare Workstation 6.5.2 On BackTrack 4</title><link>https://www.offsec.com/blog/installing-vmware-workstation-6-5-2-on-backtrack-4/</link><guid isPermaLink="true">https://www.offsec.com/blog/installing-vmware-workstation-6-5-2-on-backtrack-4/</guid><description>Installing VMWare Workstation 6.5.2 On BackTrack 4 </description><pubDate>Sat, 20 Jun 2009 04:43:10 GMT</pubDate></item><item><title>Keeping BackTrack up to Date</title><link>https://www.offsec.com/blog/keeping-backtrack-up-to-date/</link><guid isPermaLink="true">https://www.offsec.com/blog/keeping-backtrack-up-to-date/</guid><description>Keeping BackTrack up to Date</description><pubDate>Sat, 20 Jun 2009 03:47:42 GMT</pubDate></item><item><title>Installing BackTrack 4 as a VMware Guest</title><link>https://www.offsec.com/blog/installing-backtrack-as-a-vmware-guest/</link><guid isPermaLink="true">https://www.offsec.com/blog/installing-backtrack-as-a-vmware-guest/</guid><description>Installing BackTrack 4 as a VMware Guest</description><pubDate>Fri, 19 Jun 2009 19:19:11 GMT</pubDate></item><item><title>BackTrack 4 Pre Final – Public Release and Download</title><link>https://www.offsec.com/blog/backtrack-pre-final-public-release-and-download/</link><guid isPermaLink="true">https://www.offsec.com/blog/backtrack-pre-final-public-release-and-download/</guid><description>BackTrack 4 Pre Final public release, download, and getting started guide</description><pubDate>Fri, 19 Jun 2009 14:01:31 GMT</pubDate></item><item><title>ITunes Reloaded – Getting the Shell</title><link>https://www.offsec.com/blog/information-security-itunes-reloaded/</link><guid isPermaLink="true">https://www.offsec.com/blog/information-security-itunes-reloaded/</guid><description>Exploiting iTunes, part 2</description><pubDate>Thu, 18 Jun 2009 07:30:48 GMT</pubDate></item><item><title>ITunes Exploitation Case Study</title><link>https://www.offsec.com/blog/itunes-exploitation-case-study/</link><guid isPermaLink="true">https://www.offsec.com/blog/itunes-exploitation-case-study/</guid><description>ITunes Exploitation Case Study</description><pubDate>Thu, 11 Jun 2009 18:57:20 GMT</pubDate></item><item><title>CUDA and ATI Stream in BackTrack 4</title><link>https://www.offsec.com/blog/cuda-and-ati-stream-backtrack/</link><guid isPermaLink="true">https://www.offsec.com/blog/cuda-and-ati-stream-backtrack/</guid><description>CUDA and ATI Stream GPU password cracking in BackTrack 4</description><pubDate>Mon, 08 Jun 2009 04:03:27 GMT</pubDate></item><item><title>The Fingerprinting power in BackTrack4</title><link>https://www.offsec.com/blog/the-fingerprinting-power-in-backtrack4/</link><guid isPermaLink="true">https://www.offsec.com/blog/the-fingerprinting-power-in-backtrack4/</guid><description>BackTrack4 fprint configuration guide</description><pubDate>Fri, 05 Jun 2009 13:45:21 GMT</pubDate></item><item><title>Backtrack 4 Powered with CUDA</title><link>https://www.offsec.com/blog/backtrack-4-powered-with-cuda/</link><guid isPermaLink="true">https://www.offsec.com/blog/backtrack-4-powered-with-cuda/</guid><description>WPA Cracking with NVIDIA CUDA</description><pubDate>Fri, 05 Jun 2009 01:01:26 GMT</pubDate></item><item><title>Customizing the BackTrack 4 PreFinal ISO</title><link>https://www.offsec.com/blog/customising-the-backtrack-4-prefinal-iso/</link><guid isPermaLink="true">https://www.offsec.com/blog/customising-the-backtrack-4-prefinal-iso/</guid><description>Customizing the BackTrack 4 PreFinal ISO</description><pubDate>Sun, 31 May 2009 23:11:27 GMT</pubDate></item><item><title>Backtrack 4 Forensics Capabilities</title><link>https://www.offsec.com/blog/backtrack-forensics/</link><guid isPermaLink="true">https://www.offsec.com/blog/backtrack-forensics/</guid><description>Backtrack 4 Forensics Capabilities</description><pubDate>Sun, 31 May 2009 02:51:17 GMT</pubDate></item><item><title>BackTrack 4 Pre Final Sneak Peek</title><link>https://www.offsec.com/blog/backtrack-4-pre-final-sneak-peek/</link><guid isPermaLink="true">https://www.offsec.com/blog/backtrack-4-pre-final-sneak-peek/</guid><description>BackTrack 4 Pre Final Sneak Peek</description><pubDate>Tue, 26 May 2009 18:38:24 GMT</pubDate></item><item><title>BackTrack 4 Pre Final</title><link>https://www.offsec.com/blog/backtrack-4-pre-final/</link><guid isPermaLink="true">https://www.offsec.com/blog/backtrack-4-pre-final/</guid><description>There have been many changes introduced into BackTrack 4 &amp;#8211; most notably, our move to an Ubuntu Intrepid base. We now maintain our own full repositories with modified Ubuntu packages in addition to our own penetration testing tools.</description><pubDate>Tue, 19 May 2009 17:53:56 GMT</pubDate></item></channel></rss>