Home Security Penetration Testing

Penetration Testing

Packt Hub provides the latest penetration testing news. Whether you work with Kali Linux or Metasploit, we have tutorials and insights to keep your products safe.

Top 6 Cybersecurity Books from Packt to Accelerate Your Career

0
With new technology threats, rising international tensions, and state-sponsored cyber-attacks, cybersecurity is more important than ever. In organizations worldwide, there is not only a dire need for cybersecurity...

Starting Out with BackBox Linux

0
(For more resources related to this topic, see here.) A flexible penetration testing distribution BackBox Linux is a very young project designed for penetration testing, vulnerability...

Essential skills for penetration testing

0
Cybercriminals are continally developing new and more sophisticated ways to exploit software vulnerabilities, making it increasingly difficult to defend our systems. Today, then, we need...

Exploiting Services with Python

0
In this article by Christopher Duffy author of the book Learning Python Penetration Testing, we will learn about one of the big misconceptions with...
ethical hacker code debug

10 times ethical hackers spotted a software vulnerability and averted a crisis

0
A rise in multiple cyber-attacks and the lack of knowledge and defenses to tackle them has made it extremely important for companies to use...
Humble Bundle and Packt partner on AI bundle

Kali Linux 2019.4 released with Xfce, a new desktop environment, a new GTK3 theme,...

0
On November 26, the Kali Linux team announced its fourth and final release of 2019, Kali Linux 2019.4, which is readily available for download....

Auditing Mobile Applications

0
In this article by Prashant Verma and Akshay Dikshit, author of the book Mobile Device Exploitation Cookbook we will cover the following topics: Auditing Android...

Ruby and Metasploit Modules

0
(For more resources related to this topic, see here.) Reinventing Metasploit Consider a scenario where the systems under the scope of the penetration test are very...

What we can learn from attacks on the WEP Protocol

0
In the past years, many types of attacks on the WEP protocol have been undertaken. Being successful with such an attack is an important...

Social-Engineer Toolkit

0
(For more resources related to this topic, see here.) Social engineering is an act of manipulating people to perform actions that they don't intend to...

Must Read in Security

Top 6 Cybersecurity Books from Packt to Accelerate Your Career

0
With new technology threats, rising international tensions, and state-sponsored cyber-attacks, cybersecurity is more important than ever. In organizations worldwide, there is not only a dire need for cybersecurity...

Win-KeX Version 2.0 from Kali Linux

Interviews