Penetration testing

Penetration testing
In the previous article about SNMP, we have discussed how to set up your own vulnerable lab where we have configured pfSense and VyOS with SNMP misconfigurat

May 05, 2016
Srinivas
Penetration testing
There are various for analyzing Snort rules performance. In this lab, we are going to focus on the one that directly applies to rules: Rule Profiling. With t

April 21, 2016
Infosec
Penetration testing
IDSs and IPSs can be attacked by generating false positives. If you can generate enough false positives, you can potentially: Overwhelm the IDS console tool

April 19, 2016
Infosec
Penetration testing
In this lab, you are going to learn how to create custom Snort signatures for the Modbus/TCP protocol. [pkadzone zone="main_top"] First, let's take some tim

April 14, 2016
Infosec
Penetration testing
Until now, when we used Snort to look for certain content within the payload, we've always looked for some specific values. What if we wanted to look for som

April 12, 2016
Infosec
Penetration testing
Exercise 1: Packet Sniping FlexResp is a keyword used within Snort to snipe or tear down existing connections. The resp keyword is used to close sessions whe

April 07, 2016
Infosec
Penetration testing
In the previous part, we have discussed the ELF and Program Header. In this article, we will cover the remaining part i.e. section headers. We will also see

April 07, 2016
Security Ninja
Penetration testing
Since we have completed the PE structure, now it is time to look at the ELF structure which is somewhat easier to understand as compared to PE. For ELF struc

April 05, 2016
Security Ninja
Penetration testing
Lab 4: Tracking Exploit Progress with Flowbits So far in our exercises, we used individual rules against specific activities. The flowbits keyword allows sev

April 05, 2016
Infosec
Penetration testing
Lab 3: Covert Channels Covert channels are used by outside attackers to establish communications with the compromised system, or by malicious insiders to sec

March 31, 2016
InfosecIn this series
- Top 5 Kali Linux tools for password attacks in 2025
- Top 19 Kali Linux tools for vulnerability assessments
- Kali Linux: Top 8 tools for wireless attacks
- SigintOS: Signal Intelligence via a single graphical interface [updated 2025]
- Top 10 Linux distro for ethical hacking and penetration testing
- What is penetration testing (pentesting), and how does it work? What you need to know
- What is red team testing, and how does it work? What you need to know
- Penetration testing steps: How-to guide on pentesting
- How does automated penetration testing work?
- Intelligence-led pentesting and the evolution of Red Team operations
- Red Teaming: Taking advantage of Certify to attack AD networks
- How ethical hacking and pentesting is changing in 2022
- Ransomware penetration testing: Verifying your ransomware readiness
- Red Teaming: Main tools for wireless penetration tests
- Fundamentals of IoT firmware reverse engineering
- Red Teaming: Top tools and gadgets for physical assessments
- Red teaming: Initial access and foothold
- Top tools for red teaming
- What is penetration testing, anyway?
- Red Teaming: Persistence Techniques
- Red Teaming: Credential dumping techniques
- Top 6 bug bounty programs for cybersecurity professionals
- Tunneling and port forwarding tools used during red teaming assessments
- Top tools for mobile android assessments
- Top tools for mobile iOS assessments
- Red Team: C2 frameworks for pentesting
- Inside 1,602 pentests: Common vulnerabilities, findings and fixes
- Red teaming tutorial: Active directory pentesting approach and tools
- Red Team tutorial: A walkthrough on memory injection techniques
- Python for active defense: Monitoring
- Python for active defense: Network
- Python for active defense: Decoys
- How to write a port scanner in Python in 5 minutes: Example and walkthrough
- Using Python for MITRE ATT&CK and data encrypted for impact
- Explore Python for MITRE ATT&CK exfiltration and non-application layer protocol
- Explore Python for MITRE ATT&CK command-and-control
- Explore Python for MITRE ATT&CK email collection and clipboard data
- Explore Python for MITRE ATT&CK lateral movement and remote services
- Explore Python for MITRE ATT&CK account and directory discovery
- Explore Python for MITRE ATT&CK credential access and network sniffing
- Top 10 security tools for bug bounty hunters
- Kali Linux: Top 5 tools for post exploitation
- Kali Linux: Top 5 tools for database security assessments
- Kali Linux: Top 5 tools for information gathering
- Kali Linux: Top 5 tools for sniffing and spoofing
- Kali Linux: Top 5 tools for penetration testing reporting
- Kali Linux overview: 14 uses for digital forensics and pentesting
- Explore Python for MITRE ATT&CK persistence
- Explore Python for MITRE ATT&CK defense evasion
- Explore Python for MITRE ATT&CK privilege escalation
Get certified and advance your career!
- Exam Pass Guarantee
- Live instruction
- CompTIA, ISACA, ISC2, Cisco, Microsoft and more!