Penetration Testing

Penetration Testing and Setup

(For more resources related to this topic, see here.) Penetration Testing goes beyond an assessment by evaluating identified vulnerabilities to…

11 years ago

Quick start – Using Burp Proxy

(For more resources related to this topic, see here.) At the top of Burp Proxy, you will notice the following…

11 years ago

So, what is Metasploit?

(For more resources related to this topic, see here.) In the IT industry, we have various flavors of operating systems…

11 years ago

Building an app using Backbone.js

(For more resources related to this topic, see here.) Building a Hello World app For building the app you will…

11 years ago

Kali Linux Social Engineering Toolkit Tutorial: Credential Harvester

An example of a social engineering attack using Kali Linux - use a credential harvester to gather the victim's credentials.…

11 years ago

Planning the lab environment

(For more resources related to this topic, see here.) Getting ready To get the best result after setting up your…

11 years ago

BackTrack Forensics

(For more resources related to this topic, see here.) Intrusion detection and log analysis Intrusion detection is a method used…

11 years ago

FAQs on BackTrack 4

BackTrack 4: Assuring Security by Penetration Testing Master the art of penetration testing with BackTrack         Q:…

13 years ago

BackTrack 4: Penetration testing methodologies

A robust penetration testing methodology needs a roadmap. This will provide practical ideas and proven practices which should be handled…

13 years ago

BackTrack 4: Target scoping

What is target scoping? Target Scoping is defined as an empirical process for gathering target assessment requirements and characterizing each…

13 years ago