yes thats true ..but lets not 4get one needs to forkup $150/- before you
can finger their servers

2012/5/23 Thor (Hammer of God) <t...@hammerofgod.com>

>  Hell Juan.  As per the conditions of the contract I forwarded, I am
> pleased to see that you have given me full permission to assess any systems
> of yours I feel are within scope.  I’m copying in FD again so they can all
> be witness to the fact you acting in a manner consistent with the terms of
> my contract, and that you have given me full permission to do as I wish
> with any aspect of your network without repercussions.  ****
>
> ** **
>
> I’m looking forward to it!  Thank you.****
>
> ** **
>
> *[image: Description: Description: Description: Description: Description:
> Description: Description: Description: Description: TimSig]***
>
> * *
>
> *Timothy “Thor”  Mullen*
>
> *www.hammerofgod.com*
>
> *Thor’s Microsoft Security 
> Bible<http://www.amazon.com/Thors-Microsoft-Security-Bible-Collection/dp/1597495727>
> *
>
> ** **
>
> ** **
>
> *From:* Juan Sacco [mailto:jsa...@exploitpack.com]
> *Sent:* Wednesday, May 23, 2012 7:59 AM
> *Subject:* Certificacion - Profesional Pentester****
>
> ** **
>
> Certificate como un profesional de la seguridad informática y aprende a
> realizar tu mismo un penetration testing. ****
>
>
> El curso tiene una duración de ( 15 horas de practica en laboratorio ) y
> se entrega diploma y certificado de asistencia. ( Con examen final aprobado
> )****
>
> Primer clase empieza este sabado 26, es ONLINE y en VIVO.
>
> El contenido del curso es técnico y practico, ademas se incluye licencia
> de Exploit Pack ( de regalo ) herramienta la cual utilizaremos para
> realizar testeos de intrusión.
>
> Costo total con descuento: 150 USD****
>
> Registrate ahora:
> https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=UXC4U5BSVP4P4
> ****
>
> ** **
>
> Como se realiza un Buffer Overflow y como prevenirlos?
> - Manejo de memoria
> - Procesamiento y threads
> - Escritura en memoria
> - Compilacion usando GCC
> - Debugging con GDB
> - Tecnicas de proteccion
> - Seguridad web SQL y XSS****
>
> - Debugging de sitios****
>
> - Programacion en Javacript****
>
> - Politicas de segurida
> - Arquitectura de computadores
> - Lenguaje ensamblador
> - Buffer Overflows
> - Escritura y manejo de pilas
> - Exploits con Python
>
> No se requiere ningún conocimiento previo para asistir ya que se empieza
> desde cero. ****
>
> ** **
>
> Saludos****
>
> Juan Sacco****
>
> Exploit Pack****
>
> http://exploitpack.com****
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>

<<image001.png>>

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to