Introduction to Penetration Testing and Kali Linux
In this article by Juned A Ansari, author of the book, Web Penetration Testing with Kali Linux, Second Edition, the author wants us to...
Exploiting Services with Python
In this article by Christopher Duffy author of the book Learning Python Penetration Testing, we will learn about one of the big misconceptions with...
Assessment Planning
In this article by Kevin Cardwell the author of the book Advanced Penetration Testing for Highly-Secured Environments - Second Edition, discusses the test environment and...
Android and iOS Apps Testing at a Glance
In this article by Vijay Velu, the author of Mobile Application Penetration Testing, we will discuss the current state of mobile application security and...
Common WLAN Protection Mechanisms and their Flaws
In this article by Vyacheslav Fadyushin, the author of the book Building a Pentesting Lab for Wireless Networks, we will discuss various WLAN protection mechanisms...
Python Scripting Essentials
In this article by Rejah Rehim, author of the book Mastering Python Penetration Testing, we will cover:
Setting up the scripting environment in different operating systems
Installing...
Auditing Mobile Applications
In this article by Prashant Verma and Akshay Dikshit, author of the book Mobile Device Exploitation Cookbook we will cover the following topics:
Auditing Android...
Hacking Android Apps Using the Xposed Framework
In this article by Srinivasa Rao Kotipalli and Mohammed A. Imran, authors of Hacking Android, we will discuss Android security, which is one of...
Introducing Penetration Testing
In this article by Kevin Cardwell, the author of the book Building Virtual Pentesting Labs for Advanced Penetration Testing, we will discuss the role...
Approaching a Penetration Test Using Metasploit
"In God I trust, all others I pen-test" - Binoj Koshy, cyber security expert
In this article by Nipun Jaswal, authors of Mastering Metasploit, Second Edition, we...