Blog
News and updates from OffSec

Jul 5, 2010
1 min read
How to Update to BackTrack 2.6.34
Howto Update BackTrack to the latest Kernel 2.6.34

Kali Linux
BackTrack ISO Kernel 2.6.34 Upgrade
BackTrack ISO Kernel 2.6.34 Upgrade
Jul 2, 2010
3 min read

Kali Linux
How to Hack your Way to BlackHat Vegas
Cyber Hacking Challenge – HSIYF 2 by Offensive Security
Jun 24, 2010
2 min read

Kali Linux
Penetration Testing Tools
Penetration Testing Tools for BackTrack 4 R1 – Submit your idea today!
Jun 24, 2010
1 min read

Exploit Development
Evocam Remote Buffer Overflow on OSX
A tutorial on the Evocam Remote Buffer Overflow on OSX 10.5.8
Jun 4, 2010
10 min read

OffSec News
Hacking Challenge #2 – HSIYF for Charity
HFC Cyber Hacking Challenge – How strong is your Fu for charity?
May 26, 2010
2 min read

Kali Linux
BackTrack 4 R1 Dev Public Release
The best information security distribution for penetration testing and security audits. Help us test the R1 Development release.
May 10, 2010
2 min read

Kali Linux
BackTrack 4 Release 1 (R1 Dev)
The leading Information Security and Penetration Testing Distribution
May 5, 2010
2 min read

Kali Linux
Malicious Google Gadgets in Action
Malicious Google Gadgets in Action Video – by Offensive Security
May 3, 2010
1 min read

Kali Linux
Penetration Testing in the Real World
Penetration Testing video by Offensive Security – Real world scenario.
Apr 27, 2010
1 min read

Kali Linux
How Strong is Your Fu?
Offensive Security Holds first Hacking Tournament – How strong is Your Fu?
Apr 20, 2010
1 min read

Exploit Development
Return Oriented Exploitation (ROP)
For all those who registered to AWE in BlackHat Vegas 2010 – we have special surprise for you… We’ve updated our “Bypassing NX” module with the buzzing ROP exploitation method.
Apr 12, 2010
3 min read

Kali Linux
PHP 6.0 Dev str_transliterate() 0Day Buffer Overflow Exploit
An interesting submission to EDB today from the guys at http://www.nullbyte.org.il – a PHP 6.0 0day buffer overflow.
Apr 5, 2010
0Join the OffSec Community!
Our community members connect, communicate and collaborate on all things cybersecurity.