Penetration testing June 28, 2021 Lester Obbayi Top 19 Kali Linux tools for vulnerability assessments These tools will help you find vulnerabilities and keep your organization safe.
Penetration testing June 24, 2021 Howard Poston Explore Python for MITRE ATT&CK persistence Persistence is important to protect a penetration tester’s access against remediation attempts. Python can be used for persistence in a variety of ways.
Penetration testing June 22, 2021 Howard Poston Explore Python for MITRE ATT&CK defense evasion Python can impair defenses like antivirus software and hide malicious code from detection. Learn how.
Penetration testing June 18, 2021 Howard Poston Explore Python for MITRE ATT&CK privilege escalation Python is used to achieve privilege escalation, a common goal of penetration testers looking to expand and increase their access to a compromised network.
Penetration testing June 10, 2021 Howard Poston Explore Python for MITRE ATT&CK initial access Gaining initial access to a target environment provides many opportunities for using Python scripts.
Penetration testing June 7, 2021 Lester Obbayi Top 18 tools for vulnerability exploitation in Kali Linux There are many tools that hackers can use to perform exploitations of discovered vulnerabilities across a variety of systems and platforms
Penetration testing June 4, 2021 Howard Poston Explore Python for MITRE PRE-ATT&CK, network scanning and Scapy Learn how to use Python for reconnaissance, which is one of the pre-attack stages of the MITRE ATT&CK framework.
Penetration testing May 26, 2021 Dan Virgillito Kali Linux: Top 5 tools for social engineering These Kali Linux tools can help you learn more about social engineering threats.
Penetration testing March 1, 2021 Infosec Basic snort rules syntax and usage [updated 2021] In this series of lab exercises, we will demonstrate various techniques in writing Snort rules, from basic rules syntax to writing rules aimed at detecting...
Penetration testing February 22, 2021 Satyam Singh Exploiting NFS share [updated 2021] Recently, while performing a network-level penetration testing activity for one of the clients, I came across a vulnerability which was used to compromise almost...