Penetration Testing

Using the client as pivot point

Pivoting To set our potential pivot point, we first need to exploit a machine. Then we need to check for…

10 years ago

Metasploit Custom Modules and Meterpreter Scripting

(For more resources related to this topic, see here.) Writing out a custom FTP scanner module Let's try and build…

10 years ago

Ruby and Metasploit Modules

(For more resources related to this topic, see here.) Reinventing Metasploit Consider a scenario where the systems under the scope…

10 years ago

Network Exploitation and Monitoring

(For more resources related to this topic, see here.) Man-in-the-middle attacks Using ARP abuse, we can actually perform more elaborate…

10 years ago

Reversing Android Applications

(For more resources related to this topic, see here.) Android application teardown An Android application is an archive file of…

10 years ago

Target Exploitation

(For more resources related to this topic, see here.) Vulnerability research Understanding the capabilities of a specific software or hardware…

10 years ago

Starting Out with BackBox Linux

(For more resources related to this topic, see here.) A flexible penetration testing distribution BackBox Linux is a very young…

10 years ago

Social Engineering Attacks

(For more resources related to this topic, see here.) Advanced Persistent Threats Advanced Persistent Threats came into existence during cyber…

10 years ago

Web app penetration testing in Kali

(For more resources related to this topic, see here.) Web apps are now a major part of today's World Wide…

11 years ago

Wireless Attacks in Kali Linux

In this article, by Willie L. Pritchett, author of the Kali Linux Cookbook, we will learn about the various wireless…

11 years ago