Penetration testing

Advance persistent threat - Lateral movement detection in Windows infrastructure - Part II

In the previous article "Advanced Persistent Threat - Lateral Movement Detection in Windows Infrastructure - Part I," we discussed the advanced threat and co

Android penetration tools walkthrough series: MobSF

This article reviews the step-by-step procedures for deploying a Pentesting tool called "MobSF," which is utilized primarily on the Android OS. MobSF is a

Building your own pentesting environment

Ethical hacking is a term used to describe hacking done by a person/individual to identify the potential vulnerabilities or weakness in the system that could

Introduction to the Nikto web application vulnerability scanner

The increase in web applications on the internet today raises a security concern because in some cases, security is haphazardly considered during development

File Decoys for Endpoints

In a typical scenario, threat actors try to gather as much information as possible (such as sensitive documents like credit card numbers, SSN details, and pa

Benefits of using a third-party pentesting company

Benefits of pentesting The process of penetration testing (pen testing) is one of the best ways to visualize one’s own computer system—including its potenti

Nmap cheat sheet: Part 4

This is the fourth part of our Nmap Cheat Sheet. Here we will discuss more about firewall scanning, IDS/IPS Evasion, web server pen testing, etc. Before that

Nmap cheat sheet: From discovery to exploits, Part 3: Gathering additional information about host and network

As we discussed before, this is our third installment in our Nmap series. Nmap is well known for port scanning, port discovery, and port mapping. But we c

How to Set Up a Web App Pentesting Lab in 4 Easy Steps

A pentesting lab can be a small entity used by one security tester, consisting of one or two computers; or it could be a larger set of networked computers be

10 Steps to Detect Lateral Movement in a Data Breach

Many enterprises spend millions of dollars on solutions that promise to bolster their security. However, much less focus is placed on the ability to detect l