Penetration Testing: by author

296 messages starting Jan 13 04 and ending Jan 05 04
Date index | Thread index | Author index


Aaron Turner

Re: Converting raw 802.11 (rfmon) capture file to standard libpcap Aaron Turner (Jan 13)

Adam Tuliper

Re: Reverse Engineering thoughts Adam Tuliper (Jan 07)
Re: SQL Injection question Adam Tuliper (Jan 05)
legal documents Adam Tuliper (Jan 07)

ADM SMS

RE: digital surveillance techniques for forensics/penetration ADM SMS (Jan 27)

Alfred Huger

Replies on the list. Alfred Huger (Jan 20)
Ethical Hacking etc. Alfred Huger (Jan 20)
Pretty interesting article Alfred Huger (Jan 30)
New articles @ SecurityFocus Alfred Huger (Jan 27)
Lists are now open Alfred Huger (Jan 05)

Alla Bezroutchko

Re: Some unusual network features Alla Bezroutchko (Jan 14)

Alvin Oga

Re: hardware vs. john the ripper - fun Alvin Oga (Jan 22)

Amal Al Hajeri

SSL Proxy Amal Al Hajeri (Jan 06)

amine

Re: VMWare and which linux distro? amine (Jan 08)

Anders Thulin

Re: hardware vs. john the ripper Anders Thulin (Jan 23)

Andrew Lancashire

Re: l0phtcrack under wine - successful Andrew Lancashire (Jan 08)

Andrew Simmons

Re: Some unusual network features Andrew Simmons (Jan 13)

Andy Cuff

Pen Test vs. Health Check Andy Cuff (Jan 25)

Andy Cuff [Talisker]

SUMMARY: Re: Ethical Hacking Training Andy Cuff [Talisker] (Jan 19)
Re: Ethical Hacking Training Andy Cuff [Talisker] (Jan 16)
Ethical Hacking Training Andy Cuff [Talisker] (Jan 15)

Andy Paton

How to pick the right company for penetration testing? Andy Paton (Jan 25)

Anthony G Persaud

Parsing nmap xml output files with PERL Anthony G Persaud (Jan 07)

Anup

Re: IP Address Auditing Tool? Anup (Jan 27)

Atul Porwal

RE: Hacking USB Thumbdrives, Thumprint authentication Atul Porwal (Jan 27)

Bill Weiss

Re: digital surveillance techniques for forensics/penetration Bill Weiss (Jan 23)

Bram Matthys (Syzop)

Re: Openssl proof of concept code? Bram Matthys (Syzop) (Jan 09)

Brett Moore

RE: Reverse Engineering thoughts Brett Moore (Jan 07)

Brewis, Mark

RE: MS crypto API based ssl proxy?? Brewis, Mark (Jan 07)

Brian Hatch

Re: SSL Proxy Brian Hatch (Jan 07)

Byron Sonne

Re: VMWare and which linux distro? Byron Sonne (Jan 08)
Re: digital surveillance techniques for forensics/penetration Byron Sonne (Jan 23)
Re: hardware vs. john the ripper - fun Byron Sonne (Jan 23)

Camper

RE: IP Address Auditing Tool? Camper (Jan 27)
IP Address Auditing Tool? Camper (Jan 25)

Carrick, Brian A

RE: AIX Pen test tools Carrick, Brian A (Jan 26)
RE: How to pick the right company for penetration testing? Carrick, Brian A (Jan 26)

cdowns

Re: Auditing / Logging cdowns (Jan 13)

charl van der walt

RE: Ethical Hacking Training charl van der walt (Jan 16)

Chris Eagle

RE: Converting raw 802.11 (rfmon) capture file to standard libpcap Chris Eagle (Jan 12)
RE: Converting raw 802.11 (rfmon) capture file to standard libpcap Chris Eagle (Jan 14)
RE: Converting raw 802.11 (rfmon) capture file to standard libpcap Chris Eagle (Jan 12)

Chris Kirschke

Re: Ethical Hacking Training Chris Kirschke (Jan 20)

Chris Reining

Re: digital surveillance techniques for forensics/penetration Chris Reining (Jan 25)

Christopher Downs

Re: VMWare and which linux distro? Christopher Downs (Jan 08)

Christoph Strizik

RE: VMWare and which linux distro? Christoph Strizik (Jan 08)

Chuck Fullerton

Re: Pen testing training / certification Chuck Fullerton (Jan 30)

circut

Re: VMWare and which linux distro? circut (Jan 08)

Clint Bodungen

Re: Interesting challenge Clint Bodungen (Jan 30)
Re: Pen Test vs. Health Check Clint Bodungen (Jan 28)
Re: Pen Test vs. Health Check Clint Bodungen (Jan 27)

contact

Paros v3.1 released contact (Jan 25)

Craig Pringle

Re: Hacking USB Thumbdrives, Thumprint authentication Craig Pringle (Jan 26)

Cure, Samuel J

RE: How to pick the right company for penetration testing? Cure, Samuel J (Jan 27)

DaemonLabs.com Support (MLM)

Re: HailStorm - was digital surveillance techniques for forensics/penetration DaemonLabs.com Support (MLM) (Jan 29)

Dale Laney

RE: Open tcp port 2005 on cisco router Dale Laney (Jan 07)

Dale Moews

Re: Pen testing training / certification Dale Moews (Jan 30)

Daniel Lucq

Re: Some unusual network features Daniel Lucq (Jan 15)

danielrm26

Re: Pen Test vs. Health Check danielrm26 (Jan 28)
Re: Pen Test vs. Health Check danielrm26 (Jan 27)

Daniel Staal

RE: Interesting challenge Daniel Staal (Jan 31)

Daryl Davis

Ethical Hacking Training Daryl Davis (Jan 20)

David Barroso

Re: Interesting challenge David Barroso (Jan 30)

David Kennedy CISSP

Re: Openssl proof of concept code? David Kennedy CISSP (Jan 09)

Deckard, Jason

RE: Some unusual network features Deckard, Jason (Jan 14)

DeGennaro, Gregory

RE: Ethical Hacking Training DeGennaro, Gregory (Jan 19)
RE: Ethical Hacking Training DeGennaro, Gregory (Jan 20)

Deniz CEVIK

Open tcp port 2005 on cisco router Deniz CEVIK (Jan 06)
RE: Open tcp port 2005 on cisco router Deniz CEVIK (Jan 07)

Deras, Angel R./Information Systems

RE: Hacking USB Thumbdrives, Thumprint authentication Deras, Angel R./Information Systems (Jan 26)

die tuere

Re: Some unusual network features die tuere (Jan 15)

Dom

RE: hardware vs. john the ripper - fun Dom (Jan 25)

Don Parker

Re: Auditing / Logging Don Parker (Jan 12)
Re: Ethical Hacking Training Don Parker (Jan 19)
pen testing & obfuscated shell code Don Parker (Jan 30)
Re: Tool for testing anti-spoofing filter on RAS Don Parker (Jan 15)
Re: Ethical Hacking Training Don Parker (Jan 18)
Re: Auditing / Logging Don Parker (Jan 13)
Re: TCP Header manipulation of the protocol field Don Parker (Jan 30)
Re: VMWare and which linux distro? Don Parker (Jan 08)
Re: Auditing / Logging Don Parker (Jan 13)
Re: Auditing / Logging Don Parker (Jan 12)
Re: Pen Test vs. Health Check Don Parker (Jan 26)
RE: Ethical Hacking Training Don Parker (Jan 19)
RE: Ethical Hacking Training Don Parker (Jan 20)
Re: SummaryL Some unusual network features Don Parker (Jan 14)

El C0chin0

Question regarding a Nessus scan El C0chin0 (Jan 28)

Eoghan Casey

Re: digital surveillance techniques for forensics/penetration Eoghan Casey (Jan 23)

Eric Greenberg

RE: How to pick the right company for penetration testing? Eric Greenberg (Jan 27)

Eric McCarty

RE: knowing their job (was: Re: Ethical Hacking Training Eric McCarty (Jan 20)

Eric Wilson

Re: VMWare and which linux distro? Eric Wilson (Jan 08)

Erik Birkholz

Re: Offline sam dump? Erik Birkholz (Jan 29)
Re: Offline sam dump? Erik Birkholz (Jan 29)

ethanpreston

Re: Reverse Engineering thoughts ethanpreston (Jan 07)
RE: Follow up on "How much do you disclose to customers?" ethanpreston (Jan 08)
Follow up on "How much do you disclose to customers?" ethanpreston (Jan 07)

Filipe Polido

Reverse Engineering Filipe Polido (Jan 26)

fr0stman

running L0phtcrack under wine fr0stman (Jan 05)
l0phtcrack under wine - successful fr0stman (Jan 07)

Frank Knobbe

Re: running L0phtcrack under wine Frank Knobbe (Jan 07)
Re: Auditing / Logging Frank Knobbe (Jan 13)
Piercing IPAD Frank Knobbe (Jan 28)
Re: What a security test should do?- from thinking about: Ethical Hacking Training Frank Knobbe (Jan 25)
RE: Piercing IPAD Frank Knobbe (Jan 30)

Franklin Sheila H DLVA

RE: digital surveillance techniques for forensics/penetration Franklin Sheila H DLVA (Jan 28)

Frazier Evans

Re: Pen testing training / certification Frazier Evans (Jan 30)

Fyodor

Re: Reverse Engineering Fyodor (Jan 27)

Gaziel, Avishay

RE: MS crypto API based ssl proxy?? Gaziel, Avishay (Jan 07)

Gideon Rasmussen, CISSP, CFSO, CFSA, SCSA

Pen testing training / certification Gideon Rasmussen, CISSP, CFSO, CFSA, SCSA (Jan 28)
How to pick the right company for penetration testing? Gideon Rasmussen, CISSP, CFSO, CFSA, SCSA (Jan 27)

Golombek Kamil | BDO IT a.s.

RE: running L0phtcrack under wine Golombek Kamil | BDO IT a.s. (Jan 07)

Hamish webhosting.net.nz

Re: Ethical Hacking Training Hamish webhosting.net.nz (Jan 20)

Hasnain Atique

RE: Interesting challenge Hasnain Atique (Jan 31)

Herbold, John W.

RE: Hacking USB Thumbdrives, Thumprint authentication Herbold, John W. (Jan 27)

Ivan Arce

Re: Openssl proof of concept code? Ivan Arce (Jan 09)
Re: Pen Test vs. Health Check Ivan Arce (Jan 29)
Re: Pen Test vs. Health Check Ivan Arce (Jan 29)

Jack

Re: Pen testing training / certification Jack (Jan 30)

Jacobson

Re: Pen testing training / certification Jacobson (Jan 30)

James Fields

Re: What a security test should do?- from thinking about: Ethical Hacking Training James Fields (Jan 25)

James Golovich

Re: Converting raw 802.11 (rfmon) capture file to standard libpcap James Golovich (Jan 12)

James Schnack

Tool for testing anti-spoofing filter on RAS James Schnack (Jan 15)

jamesworld

Re: Open tcp port 2005 on cisco router jamesworld (Jan 07)

Jarkko Turkulainen

Multi-stage loading shellcode Jarkko Turkulainen (Jan 26)

Jason Ellison

Re: AIX Pen test tools Jason Ellison (Jan 23)

Jason Jaszewski

RE: digital surveillance techniques for forensics/penetration Jason Jaszewski (Jan 27)

jblack

Adabas database jblack (Jan 29)

Jeff Shawgo

Re: Ethical Hacking Training Jeff Shawgo (Jan 20)

Jeff Williams @ Aspect

OWASP Top Ten 2004 Update Released Jeff Williams @ Aspect (Jan 27)
Re: SQL Injection question Jeff Williams @ Aspect (Jan 05)

Jeremiah Cornelius

Re: Ethical Hacking Training Jeremiah Cornelius (Jan 18)

Jerry Shenk

Converting raw 802.11 (rfmon) capture file to standard libpcap Jerry Shenk (Jan 12)
RE: Converting raw 802.11 (rfmon) capture file to standard libpcap Jerry Shenk (Jan 13)
RE: digital surveillance techniques for forensics/penetration Jerry Shenk (Jan 23)
RE: What a security test should do?- from thinking about: Ethical Hacking Training Jerry Shenk (Jan 25)
RE: Converting raw 802.11 (rfmon) capture file to standard libpcap Jerry Shenk (Jan 12)
RE: Hacking USB Thumbdrives, Thumprint authentication Jerry Shenk (Jan 27)
RE: Converting raw 802.11 (rfmon) capture file to standard libpcap Jerry Shenk (Jan 14)
RE: Converting raw 802.11 (rfmon) capture file to standard libpcap Jerry Shenk (Jan 14)
RE: SummaryL Some unusual network features Jerry Shenk (Jan 14)
RE: Converting raw 802.11 (rfmon) capture file to standard libpcap Jerry Shenk (Jan 12)

Jimi Thompson

Re: Ethical Hacking Training Jimi Thompson (Jan 19)

J Jason Bridge

RE: IP Address Auditing Tool? J Jason Bridge (Jan 26)

Job de Haas

Re: Hacking USB Thumbdrives, Thumprint authentication Job de Haas (Jan 26)

John

SQL injection question John (Jan 21)

John Daniele

Re: digital surveillance techniques for forensics/penetration John Daniele (Jan 28)

John Davis

Re: VMWare and which linux distro? John Davis (Jan 08)

John Deatherage

RE: Hacking USB Thumbdrives, Thumprint authentication John Deatherage (Jan 26)

John Lampe

Re: [Full-Disclosure] Openssl proof of concept code? John Lampe (Jan 09)

johnny cyberpunk

Re: Reverse Engineering thoughts johnny cyberpunk (Jan 07)

jvfields

Re: TCP Header manipulation of the protocol field jvfields (Jan 30)

Karmil Asgarally

RE: VMWare and which linux distro? Karmil Asgarally (Jan 08)

Kenzo

Re: Offline sam dump? Kenzo (Jan 30)

Kerri Sharp

digital surveillance techniques for forensics/penetration Kerri Sharp (Jan 22)

Kevin Johnson

Re: Ethical Hacking Training Kevin Johnson (Jan 20)

Kim.Sassaman

Skype Kim.Sassaman (Jan 07)

Kohlenberg, Toby

RE: Ethical Hacking Training Kohlenberg, Toby (Jan 20)

Kroma Pierre

Re: SSL Proxy Kroma Pierre (Jan 07)

Kurt

RE: Ethical Hacking Training Kurt (Jan 20)

Lachniet, Mark

RE: SQL Injection question Lachniet, Mark (Jan 05)
Openssl proof of concept code? Lachniet, Mark (Jan 08)

Laurence.Field

RE: hardware vs. john the ripper - fun Laurence.Field (Jan 22)

Leif Sawyer

RE: Open tcp port 2005 on cisco router Leif Sawyer (Jan 07)

lists-mptruem-f25-com

Re: digital surveillance techniques for forensics/penetration lists-mptruem-f25-com (Jan 23)

Maarten

potential fax server security issues? Maarten (Jan 13)

Mark Melonson

Offline sam dump? Mark Melonson (Jan 28)

Mark Wolfgang

Re: TCP Header manipulation of the protocol field Mark Wolfgang (Jan 30)

Martin

Re: Oracle toplink mapping workbench password algorithm Martin (Jan 29)

Martin Mačok

Re: VMWare and which linux distro? Martin Mačok (Jan 19)
Re: Social Engineering Website (and Trojan test) Martin Mačok (Jan 12)
Re: Social Engineering Website (URL obfuscation/hiding) Martin Mačok (Jan 12)
Re: Web Application Penetration Testing Methodology Patent Martin Mačok (Jan 18)
Re: VMWare and which linux distro? Martin Mačok (Jan 08)

Matt Burnett

Re: hardware vs. john the ripper - fun Matt Burnett (Jan 23)
Re: hardware vs. john the ripper - fun Matt Burnett (Jan 23)

Matthew Wagenknecht

RE: VMWare and which linux distro? Matthew Wagenknecht (Jan 08)

Maxime Rousseau

VMWare and which linux distro? Maxime Rousseau (Jan 07)

m e

Re: Hacking USB Thumbdrives, Thumprint authentication m e (Jan 28)
Hacking USB Thumbdrives, Thumprint authentication m e (Jan 25)
Re: Hacking USB Thumbdrives, Thumprint authentication m e (Jan 28)
Re: Hacking USB Thumbdrives, Thumprint authentication m e (Jan 27)

Meritt James

Re: Hacking USB Thumbdrives, Thumprint authentication Meritt James (Jan 29)
Re: Ethical Hacking Training Meritt James (Jan 19)
Re: What a security test should do?- from thinking about: Ethical Hacking Training Meritt James (Jan 23)

Michael Burns

TCP Header manipulation of the protocol field Michael Burns (Jan 30)

Micheal Thompson

RE: legal documents Micheal Thompson (Jan 07)

miguel . dilaj

Re: running L0phtcrack under wine miguel . dilaj (Jan 07)
Re: running L0phtcrack under wine miguel . dilaj (Jan 06)

mike

Re: VMWare and which linux distro? mike (Jan 08)

Mike Hoskins

Re: Some unusual network features Mike Hoskins (Jan 13)
Re: Open tcp port 2005 on cisco router Mike Hoskins (Jan 08)
Re: Ethical Hacking Training Mike Hoskins (Jan 20)

n30

Reverse Engineering thoughts n30 (Jan 07)
Auditing / Logging n30 (Jan 12)

Nathan R. Valentine

Re: VMWare and which linux distro? Nathan R. Valentine (Jan 08)
Re: Some unusual network features Nathan R. Valentine (Jan 13)

Nexus

Re: How to pick the right company for penetration testing? Nexus (Jan 25)
Re: Pen Test vs. Health Check Nexus (Jan 25)
Re: digital surveillance techniques for forensics/penetration Nexus (Jan 29)
Re: How to pick the right company for penetration testing? Nexus (Jan 26)
Re: How to pick the right company for penetration testing? Nexus (Jan 29)

Nicola Cuomo

Re: Offline sam dump? Nicola Cuomo (Jan 29)

Nicolas Gregoire

Re: Social Engineering Website Nicolas Gregoire (Jan 13)

Otero, Hernan (EDS)

RE: Social Engineering Website Otero, Hernan (EDS) (Jan 12)

Password Crackers, Inc.

RE: hardware vs. john the ripper Password Crackers, Inc. (Jan 22)

Paul Johnston

SummaryL Some unusual network features Paul Johnston (Jan 14)
Some unusual network features Paul Johnston (Jan 13)

Pete Finnigan

Re: Oracle toplink mapping workbench password algorithm Pete Finnigan (Jan 29)
Re: SQL Injection first try - MySQL and Perl Pete Finnigan (Jan 07)
Oracle toplink mapping workbench password algorithm Pete Finnigan (Jan 28)

Pete Herzog

RE: Interesting challenge Pete Herzog (Jan 31)
RE: Web Application Penetration Testing Methodology Patent Pete Herzog (Jan 18)
What a security test should do?- from thinking about: Ethical Hacking Training Pete Herzog (Jan 23)
RE: How to pick the right company for penetration testing? Pete Herzog (Jan 26)
RE: Ethical Hacking Training Pete Herzog (Jan 19)
RE: VMWare and which linux distro? Pete Herzog (Jan 18)

Peter Hsu

Re: Auditing / Logging Peter Hsu (Jan 12)

Philippe Biondi

RE: Converting raw 802.11 (rfmon) capture file to standard libpcap Philippe Biondi (Jan 13)

Rafael Núñez

hardware vs. john the ripper Rafael Núñez (Jan 22)

Rajesh Jose

RE: Interesting challenge Rajesh Jose (Jan 31)

Random Task

Social Engineering Website Random Task (Jan 09)

Ranjeet Shetye

Re: TCP Header manipulation of the protocol field Ranjeet Shetye (Jan 30)

Rapaill

RE: VMWare and which linux distro? Rapaill (Jan 08)

R. DuFresne

Re: VMWare and which linux distro? R. DuFresne (Jan 09)
Re: Auditing / Logging R. DuFresne (Jan 12)

Riad S. Wahby

Re: Reverse Engineering thoughts Riad S. Wahby (Jan 07)

Richard Rager

Re: Question regarding a Nessus scan Richard Rager (Jan 29)
Re: Web Application Penetration Testing Methodology Patent Richard Rager (Jan 16)

rob

RE: Ethical Hacking Training rob (Jan 18)

Robert E. Lee

RE: Pen Test vs. Health Check Robert E. Lee (Jan 26)
RE: How to pick the right company for penetration testing? Robert E. Lee (Jan 27)

Robert Masse

RE: AIX Pen test tools Robert Masse (Jan 23)

Rob Shein

RE: Hacking USB Thumbdrives, Thumprint authentication Rob Shein (Jan 27)
RE: Pen Test vs. Health Check Rob Shein (Jan 26)
RE: Ethical Hacking Training Rob Shein (Jan 20)
RE: Follow up on "How much do you disclose to customers?" Rob Shein (Jan 08)
RE: What a security test should do?- from thinking about: Ethical Hacking Training Rob Shein (Jan 23)
RE: digital surveillance techniques for forensics/penetration Rob Shein (Jan 23)
RE: Auditing / Logging Rob Shein (Jan 20)
RE: Ethical Hacking Training Rob Shein (Jan 16)
RE: Skype Rob Shein (Jan 07)
RE: Auditing / Logging Rob Shein (Jan 18)
RE: Hacking USB Thumbdrives, Thumprint authentication Rob Shein (Jan 27)

Roger A. Grimes

Re: VMWare and which linux distro? Roger A. Grimes (Jan 19)

rux

RUXCON Call For Papers rux (Jan 30)

Sanjay K. Patel

AIX Pen test tools Sanjay K. Patel (Jan 23)
RE: Interesting challenge Sanjay K. Patel (Jan 30)
Interesting challenge Sanjay K. Patel (Jan 30)

.Saphyr

Re: SQL injection question .Saphyr (Jan 22)

Sasa Jusic

SQL Injection question Sasa Jusic (Jan 05)

Scovetta, Michael V

RE: SQL Injection question Scovetta, Michael V (Jan 05)

Serhan Sevim

RE: Interesting challenge Serhan Sevim (Jan 30)

Shade

Re: MS crypto API based ssl proxy?? Shade (Jan 07)

Shashank Rai

MS crypto API based ssl proxy?? Shashank Rai (Jan 06)
Re: Some unusual network features Shashank Rai (Jan 14)
RE: MS crypto API based ssl proxy?? Shashank Rai (Jan 07)
Re: MS crypto API based ssl proxy?? Shashank Rai (Jan 07)

sil

RE: Hacking USB Thumbdrives, Thumprint authentication sil (Jan 27)
Re: digital surveillance techniques for forensics/penetration sil (Jan 23)

Stephen de Vries

RE: Interesting challenge Stephen de Vries (Jan 31)

Steve Armstrong

RE: Auditing / Logging Steve Armstrong (Jan 20)

Steve Friedl

Re: potential fax server security issues? Steve Friedl (Jan 13)

Steve Goldsby (ICS)

RE: Interesting challenge Steve Goldsby (ICS) (Jan 30)

Steve Kemp

Re: VMWare and which linux distro? Steve Kemp (Jan 08)
Re: Ethical Hacking Training Steve Kemp (Jan 19)

Steve Shah

Re: Auditing / Logging Steve Shah (Jan 13)
Re: Auditing / Logging Steve Shah (Jan 13)
Re: Auditing / Logging Steve Shah (Jan 14)

S. Thomas

RE: Ethical Hacking Training S. Thomas (Jan 20)

Stormwalker

Re: Ethical Hacking Training Stormwalker (Jan 20)

Teicher, Mark (Mark)

RE: Ethical Hacking Training Teicher, Mark (Mark) (Jan 18)
RE: Ethical Hacking Training Teicher, Mark (Mark) (Jan 19)
RE: knowing their job (was: Re: Ethical Hacking Training Teicher, Mark (Mark) (Jan 20)
RE: knowing their job (was: Re: Ethical Hacking Training Teicher, Mark (Mark) (Jan 20)
RE: HailStorm - was digital surveillance techniques for forensics/penetration Teicher, Mark (Mark) (Jan 29)

Thermos, Panayiotis A. [RA]

RE: Web Application Penetration Testing Methodology Patent Thermos, Panayiotis A. [RA] (Jan 16)

Thompson, Jimi

RE: Pen Test vs. Health Check Thompson, Jimi (Jan 26)

Tibor Biro

RE: SQL Injection question Tibor Biro (Jan 05)

Tim Gurney

Re: Ethical Hacking Training Tim Gurney (Jan 20)

Tinus Janse van Rensburg

RE: How to pick the right company for penetration testing? Tinus Janse van Rensburg (Jan 28)

Travis Potter

RE: potential fax server security issues? Travis Potter (Jan 13)

Travis Schack

Re: How to pick the right company for penetration testing? Travis Schack (Jan 28)
Re: Auditing / Logging Travis Schack (Jan 12)
Re: IP Address Auditing Tool? Travis Schack (Jan 28)

Vladimir Parkhaev

Re: TCP Header manipulation of the protocol field Vladimir Parkhaev (Jan 31)

Volker Tanger

Re: Hacking USB Thumbdrives, Thumprint authentication Volker Tanger (Jan 27)
Re: MS crypto API based ssl proxy?? Volker Tanger (Jan 06)

vruy () chez com

last release 1.5 of my free NetBiosSpy vruy () chez com (Jan 22)

Walter Williams

Re: Hacking USB Thumbdrives, Thumprint authentication Walter Williams (Jan 27)

webtester

Web Application Penetration Testing Methodology Patent webtester (Jan 16)

wirepair

encrypting Autologon credentials? wirepair (Jan 28)

wjnorth

RE: How to pick the right company for penetration testing? wjnorth (Jan 29)
Re: Interesting challenge wjnorth (Jan 30)
Re: How to pick the right company for penetration testing? wjnorth (Jan 30)

Yvan Boily

RE: Pen Test vs. Health Check Yvan Boily (Jan 26)
RE: SQL Injection question Yvan Boily (Jan 05)