Wireless and Mobile Hacks
(For more resources related to this topic, see here.)
So I don't think it's possible to go to a conference these days and not see...
Open Source Intelligence
This article is written by Douglas Berdeaux, the author of Penetration Testing with Perl. Open source intelligence (OSINT) refers to intelligence gathering from open...
Pentesting Using Python
In this article by the author, Mohit, of the book, Python Penetration Testing Essentials, Penetration (pen) tester and hacker are similar terms. The difference...
Penetration Testing
In this article by Aamir Lakhani and Joseph Muniz, authors of the book Penetration Testing with Raspberry Pi, we will see the various LAN-...
What is Kali Linux
This article created by Aaron Johns, the author of Mastering Wireless Penetration Testing for Highly Secured Environments introduces Kali Linux and the steps needed...
WLAN Encryption Flaws
In this article by Cameron Buchanan, author of the book Kali Linux Wireless Penetration Testing Beginner's Guide.
(For more resources related to this topic, see...
SQL Injection
In this article by Cameron Buchanan, Terry Ip, Andrew Mabbitt, Benjamin May, and Dave Mound authors of the book Python Web Penetration Testing Cookbook,...
An Introduction to WEP
In this article by Marco Alamanni, author of the book, Kali Linux Wireless Penetration Testing Essentials, has explained that the WEP protocol was introduced...
What we can learn from attacks on the WEP Protocol
In the past years, many types of attacks on the WEP protocol have been undertaken. Being successful with such an attack is an important...
Connecting to Open Ports
Miroslav Vitula, the author of the book Learning zANTI2 for Android Pentesting, penned this article on Connecting to Open Ports, focusing on cracking passwords and setting...