Social Engineering Attacks
(For more resources related to this topic, see here.)
Advanced Persistent Threats
Advanced Persistent Threats came into existence during cyber espionage between nations. The main motive...
Starting Out with BackBox Linux
(For more resources related to this topic, see here.)
A flexible penetration testing distribution
BackBox Linux is a very young project designed for penetration testing, vulnerability...
Target Exploitation
(For more resources related to this topic, see here.)
Vulnerability research
Understanding the capabilities of a specific software or hardware product may provide a starting point...
Reversing Android Applications
(For more resources related to this topic, see here.)
Android application teardown
An Android application is an archive file of the data and resource files created...
Network Exploitation and Monitoring
(For more resources related to this topic, see here.)
Man-in-the-middle attacks
Using ARP abuse, we can actually perform more elaborate man-in-the-middle (MITM)-style attacks building on the...
Ruby and Metasploit Modules
(For more resources related to this topic, see here.)
Reinventing Metasploit
Consider a scenario where the systems under the scope of the penetration test are very...
Metasploit Custom Modules and Meterpreter Scripting
(For more resources related to this topic, see here.)
Writing out a custom FTP scanner module
Let's try and build a simple module. We will write...
Using the client as a pivot point
Pivoting
To set our potential pivot point, we first need to exploit a machine. Then we need to check for a second network card in...
Veil-Evasion
(For more resources related to this topic, see here.)
A new AV-evasion framework, written by Chris Truncer, called Veil-Evasion (www.Veil-Evasion.com), is now providing effective protection...
test-article
Service Invocation
Time for action – creating the book warehousing process
Let's create the BookWarehousingBPEL BPEL process:
We will open the SOA composite by double-clicking on the...