Penetration testing

Video Tutorial - Paraben E3 Platform and Mobile Phone Forensics

Transcription Chris S., InfoSec Institute: Hello and welcome to today's weekly video from Infosec Institute. This week we'll be doing something a little

PowerShell For Pentesters Part 2: The Essentials of PowerShell

Introduction PowerShell represents one of the most interesting and powerful languages for a pentesting purpose as we explained in the first part of this lab

Beginner’s guide to Pentesting IoT Architecture/Network and Setting up IoT Pentesting Lab - Part 2

This is the 2nd part in Pentesting and Setting up our own IoT Lab. I hope you have gone through the first part. If not, please go through it. Pentesting and

Beginner’s Guide to Pentesting IoT Architecture/Network and Setting Up IoT Pentesting Lab - Part 1

In this post, I will explain how to pentest an IoT Network/Architecture. Also, I will explain how to set up an IoT Pentesting lab for getting started with Io

Gaining Shell Access via UART Interface Part 3

This is the 3rd post in IoT-Hacking-Shell-via-UART series. I hope you have gone through the first two parts. If not, please go through them. In this part, I

Gaining Shell Access via UART Interface Part 2

This is the 2nd post in IoT-Hacking-Shell-via-UART series. I hope you have gone through the first part. If not, please go through it. In this post, I will co

Gaining Shell Access via UART Interface Part 1

What is IoT The Internet of Things (IoT) is the network of physical devices, vehicles, home, appliances, vehicle, and other items embedded with electronics,

PowerShell for pentesters part 1: Introduction to PowerShell and Cmdlets

PowerShell represents one of the most interesting and powerful languages for a pentesting purpose. [pkadzone zone="main_top"] So, we will try to fo

Android Penetration Tools Walkthrough Series: AppMon

AppMon is a suite of Python scripts that make gathering information on and penetration testing Android and iOS apps easier. AppMon integrates with the popula

Finding and exploiting XXE - XML external entities injection

In this article, we will have an in-depth look at how to find and exploit XML External Entity Injection vulnerabilities. XXE (XML External Entity) as th