Penetration testing

Firmware Analysis for IoT Devices

Introduction This is the second post in the IoT Exploitation and Penetration Testing series. In this post, we are going to have a look at a key component in

Metasploit Certification Overview

Metasploit, a well-known security framework, it is widely used by information security experts during the penetration testing process for developing and exec

Port scanners

Port scanning is a popular reconnaissance technique which is used to discover the open ports and services available on a particular host. It can be used by t

Test Lab V8: Recon and Dev-test

This is the last part of our Test Lab solutions in this article we are going to find two tokens from Recon and Dev-test system. Recon is not any system in th

Getting Started with IoT Security - Mapping the attack surface

IoT or the Internet of Things is the new buzzword all around. However, not enough attention has been paid to the security aspect of these so-called "smart" d

Black Box network penetration testing walkthrough

A Black Box penetration testing means that an ethical hacker has no knowledge of the target network. The idea is to simulate an attack which a hacker might

Penetration Testing and Cloud Platforms.

A holistic security approach also encompasses the aspect of penetration testing. Not only is it good practice to conduct regular penetration tests on all IT

Mobile device penetration testing

For this lab, we'll be using Kali Linux and android emulator to do mobile penetration testing. Kali Linux is one of the Debian-based operating system with se

Penetration testing of a citrix server

Here I'll discuss how I did a pentest of a Citrix server in a lab network. First, let us understand about Windows terminal service. [pkadzone zone="mai

Snort Lab: Activate / Dynamic Rules

We've already learned that using flowbits allows us to make Snort rules work as a group. In this lab, we are going to look at different, and a more narrowly