Penetration Testing

Packt Hub provides the latest penetration testing news. Whether you work with Kali Linux or Metasploit, we have tutorials and insights to keep your products safe.

Target Exploitation

0
(For more resources related to this topic, see here.) Vulnerability research Understanding the capabilities of a specific software or hardware product may provide a starting point...

Starting Out with BackBox Linux

0
(For more resources related to this topic, see here.) A flexible penetration testing distribution BackBox Linux is a very young project designed for penetration testing, vulnerability...

Social Engineering Attacks

0
(For more resources related to this topic, see here.) Advanced Persistent Threats Advanced Persistent Threats came into existence during cyber espionage between nations. The main motive...

Web app penetration testing in Kali

0
(For more resources related to this topic, see here.) Web apps are now a major part of today's World Wide Web. Keeping them safe and...

Social-Engineer Toolkit

0
(For more resources related to this topic, see here.) Social engineering is an act of manipulating people to perform actions that they don't intend to...

Wireless Attacks in Kali Linux

0
In this article, by Willie L. Pritchett, author of the Kali Linux Cookbook, we will learn about the various wireless attacks. These days, wireless...

Penetration Testing and Setup

0
(For more resources related to this topic, see here.) Penetration Testing goes beyond an assessment by evaluating identified vulnerabilities to verify if the vulnerability is...

Quick start – Using Burp Proxy

0
(For more resources related to this topic, see here.) At the top of Burp Proxy, you will notice the following three tabs: intercept: HTTP requests and...

Exploitation Basics

0
(For more resources related to this topic, see here.) Basic terms of exploitation The basic terms of exploitation are explained as follows: Vulnerability: A vulnerability is a...

So, what is Metasploit?

0
(For more resources related to this topic, see here.) In the IT industry, we have various flavors of operating systems ranging from Mac, Windows, *nix...

Must Read in Security

Top 6 Cybersecurity Books from Packt to Accelerate Your Career

0
With new technology threats, rising international tensions, and state-sponsored cyber-attacks, cybersecurity is more important than ever. In organizations worldwide, there is not only a dire need for cybersecurity...

Win-KeX Version 2.0 from Kali Linux

Interviews