Penetration testing

Penetration testing
Penetration testing report is the key deliverable in any security assessment activity. In Penetration testing, the final deliverable is the report which show

April 22, 2018
Satyam Singh
Penetration testing
If you are pen-testing Android applications, you will need to monitor/check many things at the same time. While doing dynamic analysis, one must take care of

April 19, 2018
Anand Varia
Penetration testing
This is the 2nd part of the solving Tiredful-API series. I hope you have gone through the 1st part. If not, please go through it. Tiredful Challenges and Sol

April 18, 2018
Nitesh Malviya
Penetration testing
In this post, I will explain how to solve Tiredful-API. Let's start. What is TIREDFUL-API TIREDFUL-API is an intentionally designed broken web application ba

April 18, 2018
Nitesh Malviya
Penetration testing
In this tutorial, we shall see how to create an apk file using the tools offered by Kali Linux. Kali Linux is a Linux distro with a preset of hacking tools a

April 17, 2018
Karthik
Penetration testing
The adoption rate of smartphones has exploded in recent years. The two dominant smartphone operating systems (OS) of today are the Android OS develope

April 12, 2018
Sayaala
Penetration testing
For any organization that processes, stores or transmits credit card data, penetration testing has been an obligation since 2013. That's when the compliance

April 12, 2018
Dan Virgillito
Penetration testing
In this article, we will be focusing on Android penetration testing tools such as Dex2Jar, JD-GUI, and Baksmali to work with reverse engineering Android APK

April 12, 2018
Suresh Khutale
Penetration testing
In this article, we will look at the step by step procedure to setup utility called "Apktool" and its usage in android application penetration testing.

April 11, 2018
Suresh Khutale
Penetration testing
The Paros Proxy Lightweight Web Application tool is one of the most popular penetration testing tools for web applications. Web app developers and security e

April 10, 2018
Lester Obbayi- 12 pre-built training plans
- Employer-requested skills
- Personalized, hands-on training
In this series
- Top 5 Kali Linux tools for password attacks in 2025
- Top 19 Kali Linux tools for vulnerability assessments
- Kali Linux: Top 8 tools for wireless attacks
- SigintOS: Signal Intelligence via a single graphical interface [updated 2025]
- Top 10 Linux distro for ethical hacking and penetration testing
- What is penetration testing (pentesting), and how does it work? What you need to know
- What is red team testing, and how does it work? What you need to know
- Penetration testing steps: How-to guide on pentesting
- How does automated penetration testing work?
- Intelligence-led pentesting and the evolution of Red Team operations
- Red Teaming: Taking advantage of Certify to attack AD networks
- How ethical hacking and pentesting is changing in 2022
- Ransomware penetration testing: Verifying your ransomware readiness
- Red Teaming: Main tools for wireless penetration tests
- Fundamentals of IoT firmware reverse engineering
- Red Teaming: Top tools and gadgets for physical assessments
- Red teaming: Initial access and foothold
- Top tools for red teaming
- What is penetration testing, anyway?
- Red Teaming: Persistence Techniques
- Red Teaming: Credential dumping techniques
- Top 6 bug bounty programs for cybersecurity professionals
- Tunneling and port forwarding tools used during red teaming assessments
- Top tools for mobile android assessments
- Top tools for mobile iOS assessments
- Red Team: C2 frameworks for pentesting
- Inside 1,602 pentests: Common vulnerabilities, findings and fixes
- Red teaming tutorial: Active directory pentesting approach and tools
- Red Team tutorial: A walkthrough on memory injection techniques
- Python for active defense: Monitoring
- Python for active defense: Network
- Python for active defense: Decoys
- How to write a port scanner in Python in 5 minutes: Example and walkthrough
- Using Python for MITRE ATT&CK and data encrypted for impact
- Explore Python for MITRE ATT&CK exfiltration and non-application layer protocol
- Explore Python for MITRE ATT&CK command-and-control
- Explore Python for MITRE ATT&CK email collection and clipboard data
- Explore Python for MITRE ATT&CK lateral movement and remote services
- Explore Python for MITRE ATT&CK account and directory discovery
- Explore Python for MITRE ATT&CK credential access and network sniffing
- Top 10 security tools for bug bounty hunters
- Kali Linux: Top 5 tools for post exploitation
- Kali Linux: Top 5 tools for database security assessments
- Kali Linux: Top 5 tools for information gathering
- Kali Linux: Top 5 tools for sniffing and spoofing
- Kali Linux: Top 5 tools for penetration testing reporting
- Kali Linux overview: 14 uses for digital forensics and pentesting
- Explore Python for MITRE ATT&CK persistence
- Explore Python for MITRE ATT&CK defense evasion
- Explore Python for MITRE ATT&CK privilege escalation
Get certified and advance your career!
- Exam Pass Guarantee
- Live instruction
- CompTIA, ISACA, ISC2, Cisco, Microsoft and more!