Penetration testing

Advanced Techniques Attackers Use to Crack Passwords

The common denominator of most massive data breaches is the use of weak passwords. Some are so weak that they could be cracked instantly with commercial dict

Advanced IronWASP

In Part 1, we saw what all IronWASP is capable of and how it handles a single page scan. In Part 2, we shall see how it reacts to a complex web application o

IronWASP: An introduction

Security scanners have always played an important role during penetration testing. It helps save a lot of resources as automated testing plays a big role in

MASSCAN – Scan the internet in minutes

Scanning is a really important part of any penetration testing. It gives us more information about our target which leads to narrowing the scope of the attac

Maltego: Making sense of data

Information gathering has always been a crucial part of any penetration testing. The more information we have, the more likely we will be able to use that ag

Code Review of Node.Js Applications: Uncommon Flaws

This article covers the left-over vulnerabilities from Part-1. In this article, we will have an in-depth look at some uncommon flaws and how to find them whi

SoapUI: Security Testing

SoapUI is an SOAP (Simple Object Access Protocol) and REST (Representational state transfer) API (Application Programing Interface) testing tool. It provides

Patching by Reversing Binary

Abstract Software often distributed with vulnerabilities in production milieu either due to poor programming practice (often inadvertently) or may be owing t

Configuring Kali Linux on AWS for FREE to get the Public IP

Kali Linux is the most favorite pentesting distribution. There are thousands of tutorials for Kali Linux are available on the Internet. However, people alway

Penetration Testing from Amazon Cloud

In this article, we are going to see how we will deploy a Windows and Linux system on an Amazon cloud server for penetration testing purposes. What is the di