Penetration testing November 18, 2015 Tri Sumarno Advanced Pentesting Techniques with Metasploit In this mini-course, you will learn about some of the advanced penetration testing techniques used with Metasploit. It is expected that the reader has a basic...
Penetration testing November 12, 2015 Rorot Pentesting SAP applications : An introduction SAP (Systems-Applications-Products) is a software suite that offers standard business solutions; it is used by thousands of customers across the globe to manage...
Penetration testing October 26, 2015 Michael Born Beyond Automated Penetration Testing Not too long ago, I was tasked with performing an Application Security Assessment while onsite at a client location. I had worked with this client before,...
Penetration testing October 14, 2015 aurelius Checklist for Hiring a Good Web Penetration Tester or Web App Security Consultant The task of a web security tester or penetration tester is of course to audit the security of the web applications, web services, and web servers in a company....
Penetration testing August 20, 2015 Rorot Web Application Penetration Testing Methodology eBook 34 Page eBook This comprehensive eBook dives deep into Penetration Testing Methodology, covering Security in the SDLC, Information Gathering, Vulnerability...
Penetration testing August 18, 2015 Jim Evans When You Can’t ARPSpoof There are times during a penetration test when you are having difficulty gaining the credentials you want from a host that has already been compromised. You...
Penetration testing August 14, 2015 Infosec MongoDB Pentesting for Absolute Beginners 74 Page eBook Are you a security freak looking to learn MongoDB penetration testing? If so, our eBook "MongoDB Pentesting for Absolute Beginners" is the...
Penetration testing July 20, 2015 Fabio Natalucci Maligno: An Open Source Pentesting Tool Today I want show you a new tool that could help in your penetration testing activity. Maligno is an open source penetration-testing tool under the FreeBSD...
Penetration testing June 3, 2015 Hussam Khrais Case Study: Evading Automated Sandbox – Python PoC Introduction With the increasing of Sandbox technology usage, every penetration tester should be prepared to face it one day. While a plenty of Pentest tools...
Penetration testing May 6, 2015 Revers3r Nmap Cheat Sheet 5: The Final View of a Ninja Pentester As we discussed in the last topic of our Nmap Series, this will be our final touch for the cheat sheet. Here we will try to cover most of the topic as required...