Kali Linux 2018.2 released
Offensive security released their second incremental update on Kali Linux i.e Kali Linux 2018.2. This release comprises of all the updated packages and bug...
Information Gathering and Vulnerability Assessment
In this article by Wolf Halton and Bo Weaver, the authors of the book Kali Linux 2: Windows Penetration Testing, we try to debunk...
Penetration Testing and Setup
(For more resources related to this topic, see here.)
Penetration Testing goes beyond an assessment by evaluating identified vulnerabilities to verify if the vulnerability is...
Netflix security engineers report several TCP networking vulnerabilities in FreeBSD and Linux kernels
Yesterday, the security engineers at Netflix reported several TCP networking vulnerabilities in FreeBSD and Linux kernels. Out of these vulnerabilities, the most serious one...
Kali Linux 2018.1 released
Kali Linux 2018.1, the first of the many versions of Kali Linux for this year is now available. This release contains all the updates...
Android and iOS Apps Testing at a Glance
In this article by Vijay Velu, the author of Mobile Application Penetration Testing, we will discuss the current state of mobile application security and...
Using the client as a pivot point
Pivoting
To set our potential pivot point, we first need to exploit a machine. Then we need to check for a second network card in...
Planning the lab environment
(For more resources related to this topic, see here.)
Getting ready
To get the best result after setting up your lab, you should plan it properly...
Vevo’s YouTube account Hacked: Popular videos deleted
In this ever-growing technology era, one has to ensure the data they put on the internet is in safe hands. No matter which platform...
Kali Linux Social Engineering Toolkit Tutorial: Credential Harvester
An example of a social engineering attack using Kali Linux - use a credential harvester to gather the victim's credentials. Redirect your victim to...