Penetration Testing

Packt Hub provides the latest penetration testing news. Whether you work with Kali Linux or Metasploit, we have tutorials and insights to keep your products safe.

Pentest tool in focus: Metasploit

Kali Linux 2018.2 released

0
Offensive security released their second incremental update on Kali Linux i.e Kali Linux 2018.2.  This release comprises of all the updated packages and bug...

Information Gathering and Vulnerability Assessment

0
In this article by Wolf Halton and Bo Weaver, the authors of the book Kali Linux 2: Windows Penetration Testing, we try to debunk...

Penetration Testing and Setup

0
(For more resources related to this topic, see here.) Penetration Testing goes beyond an assessment by evaluating identified vulnerabilities to verify if the vulnerability is...
Packt and Humble Bundle come together for cybersecurity bundle

Netflix security engineers report several TCP networking vulnerabilities in FreeBSD and Linux kernels

0
Yesterday, the security engineers at Netflix reported several TCP networking vulnerabilities in FreeBSD and Linux kernels. Out of these vulnerabilities, the most serious one...
Kali Linux 2018.1 released

Kali Linux 2018.1 released

0
Kali Linux 2018.1, the first of the many versions of Kali Linux for this year is now available. This release contains all the updates...

Android and iOS Apps Testing at a Glance

0
In this article by Vijay Velu, the author of Mobile Application Penetration Testing, we will discuss the current state of mobile application security and...

Using the client as a pivot point

0
Pivoting To set our potential pivot point, we first need to exploit a machine. Then we need to check for a second network card in...

Planning the lab environment

0
(For more resources related to this topic, see here.) Getting ready To get the best result after setting up your lab, you should plan it properly...
NetSpectre attack exploits data from CPU memory

Vevo’s YouTube account Hacked: Popular videos deleted

0
In this ever-growing technology era, one has to ensure the data they put on the internet is in safe hands. No matter which platform...

Kali Linux Social Engineering Toolkit Tutorial: Credential Harvester

0
An example of a social engineering attack using Kali Linux - use a credential harvester to gather the victim's credentials. Redirect your victim to...

Must Read in Security

Top 6 Cybersecurity Books from Packt to Accelerate Your Career

0
With new technology threats, rising international tensions, and state-sponsored cyber-attacks, cybersecurity is more important than ever. In organizations worldwide, there is not only a dire need for cybersecurity...

Win-KeX Version 2.0 from Kali Linux

Interviews