Penetration Testing

Packt Hub provides the latest penetration testing news. Whether you work with Kali Linux or Metasploit, we have tutorials and insights to keep your products safe.

Social Engineering Attacks

0
(For more resources related to this topic, see here.) Advanced Persistent Threats Advanced Persistent Threats came into existence during cyber espionage between nations. The main motive...

Starting Out with BackBox Linux

0
(For more resources related to this topic, see here.) A flexible penetration testing distribution BackBox Linux is a very young project designed for penetration testing, vulnerability...

Target Exploitation

0
(For more resources related to this topic, see here.) Vulnerability research Understanding the capabilities of a specific software or hardware product may provide a starting point...

Reversing Android Applications

0
(For more resources related to this topic, see here.) Android application teardown An Android application is an archive file of the data and resource files created...

Network Exploitation and Monitoring

0
(For more resources related to this topic, see here.) Man-in-the-middle attacks Using ARP abuse, we can actually perform more elaborate man-in-the-middle (MITM)-style attacks building on the...

Ruby and Metasploit Modules

0
(For more resources related to this topic, see here.) Reinventing Metasploit Consider a scenario where the systems under the scope of the penetration test are very...

Metasploit Custom Modules and Meterpreter Scripting

0
(For more resources related to this topic, see here.) Writing out a custom FTP scanner module Let's try and build a simple module. We will write...

Using the client as a pivot point

0
Pivoting To set our potential pivot point, we first need to exploit a machine. Then we need to check for a second network card in...

Veil-Evasion

0
(For more resources related to this topic, see here.) A new AV-evasion framework, written by Chris Truncer, called Veil-Evasion (www.Veil-Evasion.com), is now providing effective protection...

test-article

0
Service Invocation Time for action – creating the book warehousing process Let's create the BookWarehousingBPEL BPEL process: We will open the SOA composite by double-clicking on the...

Must Read in Security

Top 6 Cybersecurity Books from Packt to Accelerate Your Career

0
With new technology threats, rising international tensions, and state-sponsored cyber-attacks, cybersecurity is more important than ever. In organizations worldwide, there is not only a dire need for cybersecurity...

Win-KeX Version 2.0 from Kali Linux

Interviews