Penetration Testing

Packt Hub provides the latest penetration testing news. Whether you work with Kali Linux or Metasploit, we have tutorials and insights to keep your products safe.

What does it mean to be a hacker? Adrian Pruteanu explains in the Packt Podcast

Listen: We discuss what it means to be a hacker with Adrian Pruteanu [Podcast]

0
With numerous high profile security breaches in recent years, cybersecurity feels like a particularly urgent issue. But while the media - and, indeed, the...

Quick start – Using Burp Proxy

0
(For more resources related to this topic, see here.) At the top of Burp Proxy, you will notice the following three tabs: intercept: HTTP requests and...

Web Application Information Gathering

0
In this article by Ishan Girdhar, author of the book, Kali Linux Intrusion and Exploitation Cookbook, we will cover the following recipes: Setup API...

FAQs on BackTrack 4

0
BackTrack 4: Assuring Security by Penetration Testing Master the art of penetration testing with BackTrack         Q: Which version of Backtrack is to be...

What you need to know about VPNFilter Malware Attack

0
Have you heard about the latest VPNFilter Malware attack? In brief, the software networking firm and its network analysis department known as ‘Talos’ identified a...

Finishing the Attack: Report and Withdraw

0
In this article by Michael McPhee and Jason Beltrame, the author of the book Penetration Testing with Raspberry Pi - Second Edition we will...

BackTrack Forensics

0
(For more resources related to this topic, see here.) Intrusion detection and log analysis Intrusion detection is a method used to monitor malicious activity on a...

Reversing Android Applications

0
(For more resources related to this topic, see here.) Android application teardown An Android application is an archive file of the data and resource files created...

Exploitation Basics

0
(For more resources related to this topic, see here.) Basic terms of exploitation The basic terms of exploitation are explained as follows: Vulnerability: A vulnerability is a...

So, what is Metasploit?

0
(For more resources related to this topic, see here.) In the IT industry, we have various flavors of operating systems ranging from Mac, Windows, *nix...

Must Read in Security

Top 6 Cybersecurity Books from Packt to Accelerate Your Career

0
With new technology threats, rising international tensions, and state-sponsored cyber-attacks, cybersecurity is more important than ever. In organizations worldwide, there is not only a dire need for cybersecurity...

Win-KeX Version 2.0 from Kali Linux

Interviews