Penetration testing

Penetration testing
Gaining initial access to a target environment provides many opportunities for using Python scripts.

June 10, 2021
Howard Poston
Penetration testing
There are many tools that hackers can use to perform exploitations of discovered vulnerabilities across a variety of systems and platforms

June 07, 2021
Lester Obbayi
Penetration testing
Learn how to use Python for reconnaissance, which is one of the pre-attack stages of the MITRE ATT&CK framework.

June 04, 2021
Howard Poston
Penetration testing
These Kali Linux tools can help you learn more about social engineering threats.

May 26, 2021
Dan Virgillito
Penetration testing
In this series of lab exercises, we will demonstrate various techniques in writing Snort rules, from basic rules syntax to writing rules aimed at detecting s

March 01, 2021
Infosec
Penetration testing
Recently, while performing a network-level penetration testing activity for one of the clients, I came across a vulnerability which was used to compromise al

February 22, 2021
Satyam Singh
Penetration testing
The Metasploit Framework is the most commonly-used framework for hackers worldwide. It allows hackers to set up listeners that create a conducive environment

February 10, 2021
Lester Obbayi
Penetration testing
Network Mapper (Nmap) is a network scanning and host detection tool that is very useful during several steps of penetration testing. Nmap is not limited to m

February 09, 2021
Irfan Shakeel
Penetration testing
Enumeration is defined as a process which establishes an active connection to the target hosts to discover potential attack vectors in the system, and the sa

January 22, 2021
Raghu Chakravartula
Penetration testing
In this article, we will look at the top five open-source intelligence tools. Before we jump directly into the tools, it is essential to understand what

January 21, 2021
Security NinjaIn this series
- Top 5 Kali Linux tools for password attacks in 2025
- Top 19 Kali Linux tools for vulnerability assessments
- Kali Linux: Top 8 tools for wireless attacks
- SigintOS: Signal Intelligence via a single graphical interface [updated 2025]
- Top 10 Linux distro for ethical hacking and penetration testing
- What is penetration testing (pentesting), and how does it work? What you need to know
- What is red team testing, and how does it work? What you need to know
- Penetration testing steps: How-to guide on pentesting
- How does automated penetration testing work?
- Intelligence-led pentesting and the evolution of Red Team operations
- Red Teaming: Taking advantage of Certify to attack AD networks
- How ethical hacking and pentesting is changing in 2022
- Ransomware penetration testing: Verifying your ransomware readiness
- Red Teaming: Main tools for wireless penetration tests
- Fundamentals of IoT firmware reverse engineering
- Red Teaming: Top tools and gadgets for physical assessments
- Red teaming: Initial access and foothold
- Top tools for red teaming
- What is penetration testing, anyway?
- Red Teaming: Persistence Techniques
- Red Teaming: Credential dumping techniques
- Top 6 bug bounty programs for cybersecurity professionals
- Tunneling and port forwarding tools used during red teaming assessments
- Top tools for mobile android assessments
- Top tools for mobile iOS assessments
- Red Team: C2 frameworks for pentesting
- Inside 1,602 pentests: Common vulnerabilities, findings and fixes
- Red teaming tutorial: Active directory pentesting approach and tools
- Red Team tutorial: A walkthrough on memory injection techniques
- Python for active defense: Monitoring
- Python for active defense: Network
- Python for active defense: Decoys
- How to write a port scanner in Python in 5 minutes: Example and walkthrough
- Using Python for MITRE ATT&CK and data encrypted for impact
- Explore Python for MITRE ATT&CK exfiltration and non-application layer protocol
- Explore Python for MITRE ATT&CK command-and-control
- Explore Python for MITRE ATT&CK email collection and clipboard data
- Explore Python for MITRE ATT&CK lateral movement and remote services
- Explore Python for MITRE ATT&CK account and directory discovery
- Explore Python for MITRE ATT&CK credential access and network sniffing
- Top 10 security tools for bug bounty hunters
- Kali Linux: Top 5 tools for post exploitation
- Kali Linux: Top 5 tools for database security assessments
- Kali Linux: Top 5 tools for information gathering
- Kali Linux: Top 5 tools for sniffing and spoofing
- Kali Linux: Top 5 tools for penetration testing reporting
- Kali Linux overview: 14 uses for digital forensics and pentesting
- Explore Python for MITRE ATT&CK persistence
- Explore Python for MITRE ATT&CK defense evasion
- Explore Python for MITRE ATT&CK privilege escalation
Get certified and advance your career!
- Exam Pass Guarantee
- Live instruction
- CompTIA, ISACA, ISC2, Cisco, Microsoft and more!