Penetration Testing

Kali Linux 2018 for testing and maintaining Windows security – Wolf Halton and Bo Weaver [Interview]

Microsoft Windows is one of the two most common OSes, and managing its security has spawned the discipline of Windows…

5 years ago

Metasploit 5.0 released!

Last week, the Metasploit team announced the release of its fifth version, Metasploit 5.0. This latest update introduces multiple new…

5 years ago

Phish for passwords using DNS poisoning [Tutorial]

Phishing refers to obtaining sensitive information such as passwords, usernames, or even bank details, and so on. Hackers or attackers…

6 years ago

What you need to know about VPNFilter Malware Attack

Have you heard about the latest VPNFilter Malware attack? In brief, the software networking firm and its network analysis department…

6 years ago

Parrot 4.0 is out !

Parrot, a Debian-based platform, announced the release of its latest version, Parrot 4.0. This release puts an end to all…

6 years ago

Pentest tool in focus: Metasploit

Security over the web is of the highest priority these days as most of our transactions and storage takes place…

6 years ago

5 pen testing rules of engagement: What to consider while performing Penetration testing

Penetration testing and ethical hacking are proactive ways of testing web applications by performing attacks that are similar to a…

6 years ago

Kali Linux 2018.2 released

Offensive security released their second incremental update on Kali Linux i.e Kali Linux 2018.2.  This release comprises of all the…

6 years ago

Vevo’s YouTube account Hacked: Popular videos deleted

In this ever-growing technology era, one has to ensure the data they put on the internet is in safe hands.…

6 years ago

Kali Linux 2018.1 released

Kali Linux 2018.1, the first of the many versions of Kali Linux for this year is now available. This release…

6 years ago