Penetration testing

How to make your own penetration testing lab

If you want to go into penetration testing, a home lab is a must. In this article, we’ll discuss why a home lab can be useful, the pros and cons of virtualiz

When is Wireless Penetration Testing Appropriate?

Introduction Wireless communications are an invisible, ubiquitous service that allows data to flow in and out of businesses and homes via mobile devices and

The Top 20 Penetration Testing Tools, Part 2

Introduction In this article, we continue with the theme of examining the top 20 penetration testing tools that are available today. In our last installment,

An Introduction to the Xposed Framework for Android Penetration Testing

Introduction When it comes to the Pen Testing of Android-based applications, the main focus and attention of the Pen Tester is to live in the mindset of the

Pentester Academy Command Injection ISO: SugarCRM 6.3.1 Exploitation

Introduction The Pentester Academy by Vivek Ramachandran had compiled a virtual machine that consists of various vulnerable real-world application. All the a

Important SQLMap commands

The SQLMap tool can be found in every penetration tester's toolbox. It is one of the most popular and powerful tools when it comes to exploiting SQL injectio

Top 5 (deliberately) vulnerable web applications to practice your skills on

The OWASP Top 10 includes the top 10 vulnerabilities which are followed worldwide by security researchers and developers. You must have heard or used lots of

BSides Vancouver: 2018 Walkthrough

In this article, we will learn to solve a Capture the Flag (CTF) challenge which was posted on VulnHub by "Abatchy." This CTF is a part of BSides Vancouver s

Detecting Data Breaches with Honeywords

Introduction Data breaches and security issues related to information leakage are a subject that has been making headlines in recent times. When a data breac

Pentester’s Guide to IoT Penetration Testing

IoT penetration testing specifics from a certified ethical hacker with 5+ years of experience. With the growing risk to IoT security, penetration testing ve