SQL Injection
In this article by Cameron Buchanan, Terry Ip, Andrew Mabbitt, Benjamin May, and Dave Mound authors of the book Python Web Penetration Testing Cookbook,...
Tips and Tricks on BackTrack 4
BackTrack 4: Assuring Security by Penetration Testing
Master the art of penetration testing with BackTrack
Read more about this book
(For more resources on this subject, see...
BackTrack 4: Target scoping
What is target scoping?
Target Scoping is defined as an empirical process for gathering target assessment requirements and characterizing each of its parameters to generate...
Social Engineering Attacks
(For more resources related to this topic, see here.)
Advanced Persistent Threats
Advanced Persistent Threats came into existence during cyber espionage between nations. The main motive...
Planning and Preparation
In this article by Jason Beltrame, authors of the book Penetration Testing Bootcamp, Proper planning and preparation is key to a successful penetration test....
Building an app using Backbone.js
(For more resources related to this topic, see here.)
Building a Hello World app
For building the app you will need the necessary script files and...
Assessment Planning
In this article by Kevin Cardwell the author of the book Advanced Penetration Testing for Highly-Secured Environments - Second Edition, discusses the test environment and...
test-article
Service Invocation
Time for action – creating the book warehousing process
Let's create the BookWarehousingBPEL BPEL process:
We will open the SOA composite by double-clicking on the...