Penetration testing

The “poor man’s process migration” in Windows

In the various pentesting activities, there are many instances where you need to "migrate" a particular Windows working process, typically a shell. The follo

Pentesting mobile applications with Burpsuite

Securing mobile applications is one of the most important issues today, especially with the continuing evolution of sophisticated cyber threats which are bec

Python for Security Professionals – Part 2

Introduction This is the second article on "Python for Security Professionals, " and the first article can be found at /python-security-professionals-part-1/

Python for security professionals – Part 1

The Python language has many advantages when it comes to scripting. The power of python can be felt when you start working with and try new things with it. I

Pentester Academy Command Injection ISO: Basilic 1.5.14 exploitation

The Pentester Academy has just recently launched a Command Injection ISO virtual image of Ubuntu. This image has 10 real-world applications which have a vuln

Kali Linux on AWS

The need for Penetration Testing Every organization should have a security policy designed to fit its needs based on risks, threats, regulations and the valu

Learning Pentesting with Metasploitable3: Exploiting WebDAV

In the third part of this series, we discussed how to exploit Metasploitable3 using a vulnerability in Elasticsearch 1.1.1. As mentioned in one of the prev

Learning Pentesting with Metasploitable3: Exploiting WordPress

Introduction: This is part 5 in the series of articles on learning pentesting with Metasploitable3. In the previous article, we discussed how WebDAV could be

Exploiting Windows Authentication Protocols: Introduction

SMB relay attack Exploiting the weak Windows authentication protocols is on the top of the list for any adversary, because it mostly relies on a design flaw

Trend Micro OSINT Challenge

In this article, we are going to solve all three OSINT challenges from Trend Micro CTF.[pkadzone zone="main_top"] Challenge 1: Today you received an email t