Assessment Planning
In this article by Kevin Cardwell the author of the book Advanced Penetration Testing for Highly-Secured Environments - Second Edition, discusses the test environment and...
Exploiting Services with Python
In this article by Christopher Duffy author of the book Learning Python Penetration Testing, we will learn about one of the big misconceptions with...
Introduction to Penetration Testing and Kali Linux
In this article by Juned A Ansari, author of the book, Web Penetration Testing with Kali Linux, Second Edition, the author wants us to...
Connecting to Open Ports
Miroslav Vitula, the author of the book Learning zANTI2 for Android Pentesting, penned this article on Connecting to Open Ports, focusing on cracking passwords and setting...
What we can learn from attacks on the WEP Protocol
In the past years, many types of attacks on the WEP protocol have been undertaken. Being successful with such an attack is an important...
An Introduction to WEP
In this article by Marco Alamanni, author of the book, Kali Linux Wireless Penetration Testing Essentials, has explained that the WEP protocol was introduced...
SQL Injection
In this article by Cameron Buchanan, Terry Ip, Andrew Mabbitt, Benjamin May, and Dave Mound authors of the book Python Web Penetration Testing Cookbook,...
WLAN Encryption Flaws
In this article by Cameron Buchanan, author of the book Kali Linux Wireless Penetration Testing Beginner's Guide.
(For more resources related to this topic, see...
What is Kali Linux
This article created by Aaron Johns, the author of Mastering Wireless Penetration Testing for Highly Secured Environments introduces Kali Linux and the steps needed...
Penetration Testing
In this article by Aamir Lakhani and Joseph Muniz, authors of the book Penetration Testing with Raspberry Pi, we will see the various LAN-...