Listen: We discuss what it means to be a hacker with Adrian Pruteanu [Podcast]
With numerous high profile security breaches in recent years, cybersecurity feels like a particularly urgent issue. But while the media - and, indeed, the...
Quick start – Using Burp Proxy
(For more resources related to this topic, see here.)
At the top of Burp Proxy, you will notice the following three tabs:
intercept: HTTP requests and...
Web Application Information Gathering
In this article by Ishan Girdhar, author of the book, Kali Linux Intrusion and Exploitation Cookbook, we will cover the following recipes:
Setup API...
FAQs on BackTrack 4
BackTrack 4: Assuring Security by Penetration Testing
Master the art of penetration testing with BackTrack
Q: Which version of Backtrack is to be...
What you need to know about VPNFilter Malware Attack
Have you heard about the latest VPNFilter Malware attack?
In brief, the software networking firm and its network analysis department known as ‘Talos’ identified a...
Finishing the Attack: Report and Withdraw
In this article by Michael McPhee and Jason Beltrame, the author of the book Penetration Testing with Raspberry Pi - Second Edition we will...
BackTrack Forensics
(For more resources related to this topic, see here.)
Intrusion detection and log analysis
Intrusion detection is a method used to monitor malicious activity on a...
Reversing Android Applications
(For more resources related to this topic, see here.)
Android application teardown
An Android application is an archive file of the data and resource files created...
Exploitation Basics
(For more resources related to this topic, see here.)
Basic terms of exploitation
The basic terms of exploitation are explained as follows:
Vulnerability: A vulnerability is a...
So, what is Metasploit?
(For more resources related to this topic, see here.)
In the IT industry, we have various flavors of operating systems ranging from Mac, Windows, *nix...