Blog
Feb 26, 2010
PWB V.3.0 Available March 21st, 2010
Pentesting with BackTrack (PWB) version 3 available
2 min read

The Offensive Security team is excited to announce the release date of v3.0 of the Pentesting With BackTrack Course. On March 21, 2010 the course will be made live. The team has worked overtime to ensure the videos and labs are better than ever.
With new modules, more in depth explanations and a new rich lab environment, this will prove to be a very exciting release. We are opening up early registration for those interested in signing up now. For those who have purchased the older version of the PWB Class, you can upgrade for the difference in the two course prices. These changes have also been ported to our live training events.
Whats new in PWB v.3.0 ?
- Aligned with BackTrack 4
- New Video recordings, updated courseware
- New Lab environment, doubled in size, modern OS’s added
- Added storylines to the lab, simulating a realistic corporate environment
- In depth Buffer Overflow module, including Linux Buffer Overflows
- New Web Application Attack modules
- The updated syllabus will be made available online on the 21st of march.
Course Pricing
As usual, Offsec Alumni will be able to upgrade their v2.0 course materials for 200$ not including Lab Time. We do have a package deal for both the upgrade and Lab time in our new environment. For more information about new course pricing, check the PWB course page.
How to Upgrade your Courseware
The fastest route to upgrade your course materials would be to send an email to our orders department with your full name and OSID.
Stay in the know: Become an OffSec Insider
Get the latest updates about resources, events & promotions from OffSec!
Latest from OffSec

Research & Tutorials
CVE-2025-23211: Tandoor Recipes Jinja2 SSTI to Remote Code Execution
A critical SSTI vulnerability was discovered in the open-source meal planning application Tandoor Recipes leading to a full system compromise.
May 8, 2025
2 min read

Research & Tutorials
CVE-2025-29927: Next.js Middleware Authorization Bypass
In this CVE blog, we explore a vulnerability in Next.js stemming from the improper trust of the x-middleware-subrequest header.
May 1, 2025
3 min read

Enterprise Security
When AI Becomes the Weak Link: Rethinking Supply Chain Security
AI is becoming a hidden entry point in supply chain attacks. Here’s why it matters and what organizations must do to stay protected.
Apr 30, 2025
7 min read