Penetration testing

Case Study: Evading Automated Sandbox - Python PoC

Introduction With the increasing of Sandbox technology usage, every penetration tester should be prepared to face it one day. While a plenty of Pentest tools

Nmap Cheat Sheet 5: The Final View of a Ninja Pentester

As we discussed in the last topic of our Nmap Series, this will be our final touch for the cheat sheet. Here we will try to cover most of the topic as requir

Cracking a Wi-Fi WPA2 Password, Thanks to Amazon

In a pen tester's life, sooner or later you are cracking a password. This activity depends on the type of password and available hardware. Today I want sh

Setting up a pentest Lab with pfSense in virtualBox

Penetration testing requirements often force penetration testers to do both external as well as internal assessments. This article covers the concepts that a

Antenna theory for wardriving and penetration testing

Wardriving is an activity in which a person seeks wireless access points in moving vehicles with high gain antennas mounted on the top. Usually, this access

Post-Exploitation Using Veil-Pillage

Veil-Pillage is a part of the Veil-Framework which comes handy when performing post-exploitation. It consists of a number of modules which can be used to per

WPScanner: Automated Security Testing Tool for WordPress

WordPress is the popular content management system and blogging platform being used by millions of websites. This is the reason hackers are targeting WordPre

Blackbox Assessments with Introspy

This article explains how to start performing black box assessments on Android applications using Introspy. Introspy is one of the important tools in an Andr

Advanced sqlmap

sqlmap is an attack tool which can be effectively used to perform SQL injection attacks and post exploitation acts. It is a versatile tool when it comes to S

Approaches to Information Gathering in Physical Penetration Testing - Part I: Gathering Information via Photography

1. Introduction The first phase of an attack, and in a security assessment, is to gather as much data on the target as possible. It is actually considered on