Approaching a Penetration Test Using Metasploit
"In God I trust, all others I pen-test" - Binoj Koshy, cyber security expert
In this article by Nipun Jaswal, authors of Mastering Metasploit, Second Edition, we...
Open Source Intelligence
This article is written by Douglas Berdeaux, the author of Penetration Testing with Perl. Open source intelligence (OSINT) refers to intelligence gathering from open...
Why secure web-based applications with Kali Linux?
The security of web-based applications is of critical importance. The strength of an application is about more than the collection of features it provides....
Pentest tool in focus: Metasploit
Security over the web is of the highest priority these days as most of our transactions and storage takes place on the web. Our...
Metasploit 5.0 released!
Last week, the Metasploit team announced the release of its fifth version, Metasploit 5.0. This latest update introduces multiple new features including Metasploit’s new...
Glen Singh on why Kali Linux is an arsenal for any cybersecurity professional [Interview]
Kali Linux is a popular term for anyone related to computer security. It is the most renowned tool for advanced Penetration Testing, Ethical Hacking...
Web app penetration testing in Kali
(For more resources related to this topic, see here.)
Web apps are now a major part of today's World Wide Web. Keeping them safe and...
How has ethical hacking benefited the software industry
In an online world infested with hackers, we need more ethical hackers. But all around the world, hackers have long been portrayed by the...
Kali Linux 2018 for testing and maintaining Windows security – Wolf Halton and Bo...
Microsoft Windows is one of the two most common OSes, and managing its security has spawned the discipline of Windows security. Kali Linux is...
BackTrack 4: Penetration testing methodologies
A robust penetration testing methodology needs a roadmap. This will provide practical ideas and proven practices which should be handled with great care in...