Jump to content

Offensive Security

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by Yae4 (talk | contribs) at 20:37, 18 March 2020 (Yae4 moved page Draft:Offensive Security to Offensive Security: Seems ready). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Offensive Security
FormerlyOffensive Security Services, LLC
Company typePrivate
IndustryComputer software, Information Security, Digital forensics
FoundersMati Aharoni, Devon Kearns
Headquarters
New York City
,
United States
Area served
International
Key people
ProductsKali Linux, Kali Linux NetHunter Edition aka NetHunter, Offensive Security Certified Professional
Websitewww.offensive-security.com

Offensive Security is an international company that is centered around Information security, Penetration testing and digital forensics. Operating from around 2007,[1] the company created multiple open source projects, advanced security courses, ExploitDB (Vulnerability database) and the famous Linux distribution Kali Linux. The company was established by Mati Aharoni[2], and is composed of security professionals with extensive experience in security penetration testing and system security evaluation. Across the years, the company has provided security counseling and training to the biggest technological companies in the industry[3]

Another aspect of their operation is training courses and certifications that are recognized world-wide[4], including Offensive Security Certified Professional. Certifications is given for a specific set of skills, and are widely recognized.

Background and history

Mati Aharoni, Offensive Security’s co-founder, started the business around 2006 with his wife Iris.[5] Offensive Security LLC was formed in 2008.[6][7] The company was structured as Offensive Security Services, LLC in 2012 in North Carolina.[8][9] In September 2019 the company received its first venture capital investment, from Spectrum Equity, and CEO Ning Wang replaced Joe Steinbach, the previous CEO for four years, who ran the business from the Philippines. Jim O’Gorman, the company’s chief strategy officer, also gives training and writes books. Customers include Cisco, Wells Fargo, Booz Allen Hamilton, and defense-related U.S. government agencies. The company gives training sessions at the annual Black Hat hacker conference.[5][10][11] Current headquarters are in New York City.[citation needed] Their motto is "Try Harder."[12]

Over 60% of Fortune 100 companies employ Offensive Security-trained professionals.[13]

Regarding working from home because of the corona virus, Offensive Security advised caution before "downloading something that could cause problems."[14]

A 2020 Intranet Penetration Market research report named Offensive Security as one of the global "prominent players."[15]

Projects

In addition to their business activity, the company also founded numerous open source projects, community-friendly information centers and multiple security information teaching aids.

Kali Linux

The company is known for developing Kali Linux, which is a Debian Linux based distribution for digital forensics and penetration testing. It succeeds BackTrack Linux, and is designed for security information needs, such as penetration testing and digital forensics. Kali NetHunter is Offensive Security’s project for the ARM architecture and Android devices.[16] Kali Linux contains over 600 security programs. The release of the second version (2.0) received a wide coverage in the digital media[17][18][19][20] Offensive Security provides a book, Kali Linux Revealed,[21] and makes it available for free download.[22] Users and employees have been inspired to have careers in Social Engineering.[23]

BackTrack

BackTrack Linux was an open source GNU General Public License Linux distribution developed by programmers from around the world with assistance in development and supervision from Offensive Security. The distribution was originally developed under the names Whoppix, IWHAX, and Auditor. The system was designed to delete any trace of its usage after its initial activation. The distribution has millions of downloads, and was considered to be the most widely accepted distribution among security experts.

ExploitDB

Exploit Database is an archive of vulnerable software and exploits that have been made public by the information security community. The database is designated to help penetration testers test small projects easily by sharing information with each other. The database also contains proof-of-concepts (POC), helping information security professionals learn new exploits variations.

Metasploit

Metasploit Unleashed is a charity project created by Offensive Security for the sake of Hackers for Charity. The projects teaches Metasploit and is designed especially for people who consider starting a career in penetration testing. Offensive security gave the course for free in return for a small donation for hungry children in East Africa. Offensive security improved training and documentation for the widely used Metasploit Framework tool. [24]

Google Hacking Database

Google Hacking Database was created by Johnny Long and is now hosted by Offensive Security. The project has been created as a part of Hackers for Charity. The database is helping security professionals to quickly determine whether a given application or website has been compromised. The database is going through Google, trying to establish whether lists of usernames and passwords had been compromised.

Security Certifications and Courses

Offensive Security teaches online and in-person courses in various information security disciplines. Certifications granted at the end of the course are recognized world-wide. The courses are taught by security professionals who also active penetration testers and information security experts.

Courses include:[1][25]

  •    Penetration Testing with Kali Linux (PWK)
  •    Advanced Web Attacks and Exploitation (AWAE)
  •    Cracking the Perimeter (CTP)
  •    Advanced Windows Exploitation (AWE)
  •    Offensive Security Wireless Attacks (WiFu)

See also

References

  1. ^ a b "Homepage". Offensive Security. Retrieved 26 September 2015. {{cite web}}: Cite has empty unknown parameter: |1= (help)
  2. ^ "About Us". Offensive Security. Retrieved 26 September 2015.
  3. ^ Kirk, Jeremy (Jul 29, 2014). "Zero-day flaws found in Symantec's Endpoint Protection". PC World. Retrieved 26 September 2015.
  4. ^ "Africa: Nigeria to Represent Africa At Global Cyber Security Competition". AllAfrica. 20 September 2015. Retrieved 26 September 2015. {{cite journal}}: Cite journal requires |journal= (help)
  5. ^ a b "Exclusive: Offensive Security Names New CEO; Former No. 2 at HackerOne, Lynda". Fortune. Retrieved 2020-03-17.
  6. ^ "Ning Wang, Offensive Security LLC: Profile and Biography". Bloomberg.com. Retrieved 2020-03-17.
  7. ^ "Offensive Security LLC". www.bloomberg.com. Retrieved 2020-03-17.{{cite web}}: CS1 maint: url-status (link)
  8. ^ "Offensive Security Services, LLC - Cornelius | NCCompanies.com". nccompanies.com. Retrieved 2020-03-17.
  9. ^ "Offensive Security Services, LLC". www.buzzfile.com. Retrieved 2020-03-17.
  10. ^ "Penetration Testing with Kali Linux, Black Hat USA 2018". www.blackhat.com. 2018. Retrieved 2020-03-17.{{cite web}}: CS1 maint: url-status (link)
  11. ^ "Speaker Jim O'Gorman, Black Hat USA 2018". www.blackhat.com. 2018. Retrieved 2020-03-17.{{cite web}}: CS1 maint: url-status (link)
  12. ^ Offensive Security. "What it means to try harder". www.offensive-security.com. Retrieved 2020-03-17.{{cite web}}: CS1 maint: url-status (link)
  13. ^ "'We're our own focus group' – Ning Wang on security certification, training, and keeping Kali Linux on top". The Daily Swig | Cybersecurity news and views. 2020-03-03. Retrieved 2020-03-17.
  14. ^ Weise, Elizabeth. "Working from home because of coronavirus? Be careful what you download to keep cybersafe". USA TODAY. Retrieved 2020-03-17.
  15. ^ "Intranet Penetration Market Insights and Global Outlook 2020". Galus Australis. Retrieved 2020-03-17.
  16. ^ Lobo, Savia (2019-12-12). "Why secure web-based applications with Kali Linux?". Security Boulevard. Retrieved 2020-03-17.{{cite web}}: CS1 maint: url-status (link)
  17. ^ Hoffman, Chris (August 19, 2015). "Meet Kali Linux 2.0, a distro built to hammer your security". PC World. Retrieved 26 September 2015.
  18. ^ Stahie, Silviu. "Kali Linux 2.0 Penetration Testing OS Now Based on Debian Jessie and Linux Kernel 4.0". Softpedia. Retrieved 26 September 2015.
  19. ^ Holm, Joshua Allen. "Gnome turns 18, new tools for Docker, Kali Linux 2.0, and more news". OpenSource.com. Retrieved 26 September 2015.
  20. ^ Kerner, Sean Michael. "Linux Planet". Retrieved 26 September 2015.
  21. ^ Hertzog, Raphael; O'Gorman, Jim; Aharoni, Mati (2017-06-05). Kali Linux Revealed: Mastering the Penetration Testing Distribution. Offsec Press. ISBN 978-0-9976156-0-9.
  22. ^ Kali Linux Revealed (PDF).
  23. ^ Carpenter, Perry (2019-04-30). Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors. John Wiley & Sons. ISBN 978-1-119-56637-3.
  24. ^ O'Gorman, Jim; Kearns, Devon; Aharoni, Mati (2011). Metasploit: The Penetration Tester's Guide. No Starch Press. ISBN 978-1-59327-288-3.
  25. ^ Crane, Casey (2019-11-19). "The Top Cyber Security Certifications Hiring Managers Will Look For in 2020". Security Boulevard. Retrieved 2020-03-17.{{cite web}}: CS1 maint: url-status (link)