Penetration testing

Red team assessment phases: Overview

Computer systems and networks contain valuable information, and hackers are out there trying to steal that data. This has led to the development of the red t

VulnHub machines walkthrough series: Brainpan – Part 1

Continuing with our series on testing vulnerable virtual machines, in this article we will see a walkthrough of an interesting VulnHub machine called Brainpa

Vulnerability mapping with Kali linux

Vulnerability mapping is an activity carried out to identify security flaws that can result in the compromise of a system. Sometimes researchers will use the

A brief introduction to the OpenVAS vulnerability scanner

What Is the OpenVAS vulnerability scanner? The Open Vulnerability Assessment System (OpenVAS) is a vulnerability scanner maintained and distributed by Green

How Red Teaming and Blue Teaming Complement Each Other

Red teaming and blue teaming are two different strategies for performing assessments of an organization’s cybersecurity. In this article, we will discuss the

Everything You Need To Know About Red Teaming in 2018

Introduction An old military saying states that in a long-running conflict, the opposing parties eventually adopt similar tactics. Well, if there is a long-s

Penetration testing: maintaining access

Once a pentester manages to gain access to the target system, he should work hard to keep his boat afloat, metaphorically speaking. He can choose either to u

Why DevOps Need Penetration Testing

When your goal is to innovate and deliver products and services at higher speed, security can be a bit of an afterthought. This is especially true when you c

pWeb Suite - A Set of Web Pentesting Tools

pWeb Suite (formerly known as pCrack Suite) is a set of Perl-based penetration testing tools primarily focused on web application security and vulnerability

Creating an undetectable custom SSH backdoor in Python [A – Z]

During penetration testing, sometimes you get stuck with a secure environment where all the servers and end-clients are fully patched, updated, firewalled, a