Parrot 4.0 is out !
Parrot, a Debian-based platform, announced the release of its latest version, Parrot 4.0. This release puts an end to all the development and testing...
An Introduction to WEP
In this article by Marco Alamanni, author of the book, Kali Linux Wireless Penetration Testing Essentials, has explained that the WEP protocol was introduced...
Network Exploitation and Monitoring
(For more resources related to this topic, see here.)
Man-in-the-middle attacks
Using ARP abuse, we can actually perform more elaborate man-in-the-middle (MITM)-style attacks building on the...
Penetration Testing
In this article by Aamir Lakhani and Joseph Muniz, authors of the book Penetration Testing with Raspberry Pi, we will see the various LAN-...
Target Exploitation
(For more resources related to this topic, see here.)
Vulnerability research
Understanding the capabilities of a specific software or hardware product may provide a starting point...
Wireless and Mobile Hacks
(For more resources related to this topic, see here.)
So I don't think it's possible to go to a conference these days and not see...
Introducing Penetration Testing
In this article by Kevin Cardwell, the author of the book Building Virtual Pentesting Labs for Advanced Penetration Testing, we will discuss the role...
Vulnerability Assessment
"Finding a risk is learning, Ability to identify risk exposure is a skill and exploiting it is merely a choice"
In this article by Vijay...
Introduction to Network Security
In this article by Warun Levesque, Michael McLafferty, and Arthur Salmon, the authors of the book Applied Network Security, we will be covering the following...
What is Kali Linux
This article created by Aaron Johns, the author of Mastering Wireless Penetration Testing for Highly Secured Environments introduces Kali Linux and the steps needed...