Pentest tool in focus: Metasploit
Security over the web is of the highest priority these days as most of our transactions and storage takes place on the web. Our...
5 pen testing rules of engagement: What to consider while performing Penetration testing
Penetration testing and ethical hacking are proactive ways of testing web applications by performing attacks that are similar to a real attack that could...
Kali Linux 2018.2 released
Offensive security released their second incremental update on Kali Linux i.e Kali Linux 2018.2. This release comprises of all the updated packages and bug...
Vevo’s YouTube account Hacked: Popular videos deleted
In this ever-growing technology era, one has to ensure the data they put on the internet is in safe hands. No matter which platform...
Kali Linux 2018.1 released
Kali Linux 2018.1, the first of the many versions of Kali Linux for this year is now available. This release contains all the updates...
Vulnerability Assessment
"Finding a risk is learning, Ability to identify risk exposure is a skill and exploiting it is merely a choice"
In this article by Vijay...
Planning and Preparation
In this article by Jason Beltrame, authors of the book Penetration Testing Bootcamp, Proper planning and preparation is key to a successful penetration test....
To Optimize Scans
In this article by Paulino Calderon Pale author of the book Nmap Network Exploration and Security Auditing Cookbook, Second Edition, we will explore the...
Essential skills for penetration testing
Cybercriminals are continally developing new and more sophisticated ways to exploit software vulnerabilities, making it increasingly difficult to defend our systems. Today, then, we need...
Web Application Information Gathering
In this article by Ishan Girdhar, author of the book, Kali Linux Intrusion and Exploitation Cookbook, we will cover the following recipes:
Setup API...