Am an Information Risk Consultant and Penetration Tester, i specialize mostly in penetrating secure networks/computer systems where i simulate an organized professional attack against your organization, where after that a detailed report with weakness and exploited vectors are summarized. This will help you gain control over your infrastructures security and maximize your protection.
Monday, March 03, 2014
Welcome to #Hackbattle2013, we delayed this battle so that we can have it running after AfricaHackOn this year.
This is the layout, NASTY SALON version 2, its a little diverse and tougher coz you will be dealing with a crazy crazy IDS and FW.
Anyway, lets who goes up the hill.
Infrastructure courtesy of Azanuru, for more information check azanuru.com
The information within this paper may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties with regard to this information. In no event shall the author be liable for any damages whatsoever arising out of or in connection with the use or spread of this information. Any use of this information is at the user's own risk. The information is for educational use only.
Search This Blog
Kenyan Information Security Mailist Archives
MY BEST LINKS
If you wish to join, log in to, http://lists.my.co.ke/cgi-bin/mailman/listinfo/security