Social-Engineer Toolkit
(For more resources related to this topic, see here.)
Social engineering is an act of manipulating people to perform actions that they don't intend to...
Twitter memes are being used to hide malware
Last week, a group of security researchers reported that they have found a new malware that takes its instructions from code hidden in memes...
Approaching a Penetration Test Using Metasploit
"In God I trust, all others I pen-test" - Binoj Koshy, cyber security expert
In this article by Nipun Jaswal, authors of Mastering Metasploit, Second Edition, we...
Open Source Intelligence
This article is written by Douglas Berdeaux, the author of Penetration Testing with Perl. Open source intelligence (OSINT) refers to intelligence gathering from open...
Encode your password with Spring Security 3
This article by Peter Mularien is an excerpt from the book Spring Security 3.
In this article, we will:
Examine different methods of configuring password encoding
Understand...
“Intel ME has a Manufacturing Mode vulnerability, and even giant manufacturers like Apple are...
Yesterday, a group of European information security researchers announced that they have discovered a vulnerability in Intel’s Management Engine (Intel ME) INTEL-SA-00086. They say...
Why secure web-based applications with Kali Linux?
The security of web-based applications is of critical importance. The strength of an application is about more than the collection of features it provides....
Top 5 penetration testing tools for ethical hackers
Software systems are vulnerable. That's down to a range of things, from the constant changes our software systems undergo, to the extent of the...
Pentest tool in focus: Metasploit
Security over the web is of the highest priority these days as most of our transactions and storage takes place on the web. Our...
Metasploit 5.0 released!
Last week, the Metasploit team announced the release of its fifth version, Metasploit 5.0. This latest update introduces multiple new features including Metasploit’s new...