Penetration testing

Snort network recon techniques

Lab 2: Network Recon In this lab, we will examine some popular network recon techniques and practice writing Snort rules for their detection. [pkadz

VoIP network recon: Footprinting, scanning, and enumeration

The traditional PSTN has been replaced by more advanced and efficient VoIP network. VoIP has quickly made its place in the corporate and home environment as

Complete Tour of PE and ELF: Directories

In Part 1 and Part 2 of this series we have done a walkthrough of almost 70 percent of E structure. There are still some import sections remaining like expor

Complete Tour of PE and ELF: Data Structures

We covered some important sections in Part 1 of this series. In this part, we will cover some more complex data structures including important concepts of bi

Race condition (TOCTOU) vulnerability lab

[download]CLICK HERE TO DOWNLOAD THIS LAB AS A PDF[/download] Lab overview A race condition occurs when two threads access a shared variable at the same ti

Creating your Own Simple Exploit Module for a Remote Code Execution in Web Apps

To all readers, a zip file containing the code used in the article can also be downloaded here: [download][pkadzone zone="main_top"] MSF is one of the most p

A Beginner’s Guide to Setting Up an SNMP Pentest Lab Using Vyos and Pfsense

SNMP often provides a great deal of information during the information gathering phase of a penetration test. It is often seen that SNMP protocol is commonly

Nishang: A Post-Exploitation Framework

I was recently doing an external penetration test for one of our clients, where I got shell access to Windows Server 2012(Internal WebServer sitting behind a

Pentesting SAP applications : An introduction

SAP (Systems-Applications-Products) is a software suite that offers standard business solutions; it is used by thousands of customers across the globe to man

Checklist for Hiring a Good Web Penetration Tester or Web App Security Consultant

The task of a web security tester or penetration tester is of course to audit the security of the web applications, web services, and web servers in a compan