Penetration testing November 12, 2015 Rorot Pentesting SAP Applications : An Introduction SAP (Systems-Applications-Products) is a software suite that offers standard business solutions; it is used by thousands of customers across the globe to manage...
Penetration testing October 26, 2015 Michael Born Beyond Automated Penetration Testing Not too long ago, I was tasked with performing an Application Security Assessment while onsite at a client location. I had worked with this client before,...
Penetration testing October 14, 2015 aurelius Checklist for Hiring a Good Web Penetration Tester or Web App Security Consultant The task of a web security tester or penetration tester is of course to audit the security of the web applications, web services, and web servers in a company....
Penetration testing August 20, 2015 Rorot Web Application Penetration Testing Methodology eBook 34 Page eBook This comprehensive eBook dives deep into Penetration Testing Methodology, covering Security in the SDLC, Information Gathering, Vulnerability...
Penetration testing August 18, 2015 Jim Evans When You Can’t ARPSpoof There are times during a penetration test when you are having difficulty gaining the credentials you want from a host that has already been compromised. You...
Penetration testing August 14, 2015 Infosec MongoDB Pentesting for Absolute Beginners 74 Page eBook Are you a security freak looking to learn MongoDB penetration testing? If so, our eBook "MongoDB Pentesting for Absolute Beginners" is the...
Penetration testing January 22, 2015 Pranshu Bajpai Antenna Theory for Wardriving and Penetration Testing Introduction Wardriving is an activity in which a person seeks wireless access points in moving vehicles with high gain antennas mounted on the top. Usually,...
Penetration testing April 10, 2014 Ajay Yadav .NET Penetration Testing: Test Case Cheat Sheet Having a cheat sheet is a perfect starting initiative to assist you in generating ideas while penetration testing. A test case cheat sheet is often asked for...
Penetration testing March 17, 2014 Ivan Dimov Approaches to Information Gathering in Physical Penetration Testing – Part I: Gathering Information via Photography The first phase of an attack, and in a security assessment, is to gather as much data on the target as possible. It is actually considered one of the most...
Penetration testing February 10, 2014 Chintan Gurjar Manual Web Application Penetration Testing – Suffix & Prefix in Fuzzing Introduction In this series of articles, last time we talked about fuzzing and various SQL statement special characters which can be used in fuzzing a web application....