Target Exploitation
(For more resources related to this topic, see here.)
Vulnerability research
Understanding the capabilities of a specific software or hardware product may provide a starting point...
Starting Out with BackBox Linux
(For more resources related to this topic, see here.)
A flexible penetration testing distribution
BackBox Linux is a very young project designed for penetration testing, vulnerability...
Social Engineering Attacks
(For more resources related to this topic, see here.)
Advanced Persistent Threats
Advanced Persistent Threats came into existence during cyber espionage between nations. The main motive...
Web app penetration testing in Kali
(For more resources related to this topic, see here.)
Web apps are now a major part of today's World Wide Web. Keeping them safe and...
Social-Engineer Toolkit
(For more resources related to this topic, see here.)
Social engineering is an act of manipulating people to perform actions that they don't intend to...
Wireless Attacks in Kali Linux
In this article, by Willie L. Pritchett, author of the Kali Linux Cookbook, we will learn about the various wireless attacks. These days, wireless...
Penetration Testing and Setup
(For more resources related to this topic, see here.)
Penetration Testing goes beyond an assessment by evaluating identified vulnerabilities to verify if the vulnerability is...
Quick start – Using Burp Proxy
(For more resources related to this topic, see here.)
At the top of Burp Proxy, you will notice the following three tabs:
intercept: HTTP requests and...
Exploitation Basics
(For more resources related to this topic, see here.)
Basic terms of exploitation
The basic terms of exploitation are explained as follows:
Vulnerability: A vulnerability is a...
So, what is Metasploit?
(For more resources related to this topic, see here.)
In the IT industry, we have various flavors of operating systems ranging from Mac, Windows, *nix...