Penetration testing

Explore Python for MITRE ATT&CK initial access

Gaining initial access to a target environment provides many opportunities for using Python scripts.

Top 18 tools for vulnerability exploitation in Kali Linux

There are many tools that hackers can use to perform exploitations of discovered vulnerabilities across a variety of systems and platforms

Explore Python for MITRE PRE-ATT&CK, network scanning and Scapy

Learn how to use Python for reconnaissance, which is one of the pre-attack stages of the MITRE ATT&CK framework.

Kali Linux: Top 5 tools for social engineering

These Kali Linux tools can help you learn more about social engineering threats.

Basic snort rules syntax and usage [updated 2021]

In this series of lab exercises, we will demonstrate various techniques in writing Snort rules, from basic rules syntax to writing rules aimed at detecting s

Exploiting NFS share [updated 2021]

Recently, while performing a network-level penetration testing activity for one of the clients, I came across a vulnerability which was used to compromise al

How to attack Windows 10 machine with metasploit on Kali Linux [updated 2021]

The Metasploit Framework is the most commonly-used framework for hackers worldwide. It allows hackers to set up listeners that create a conducive environment

Nmap from beginner to advanced [updated 2021]

Network Mapper (Nmap) is a network scanning and host detection tool that is very useful during several steps of penetration testing. Nmap is not limited to m

What is enumeration? [updated 2021]

Enumeration is defined as a process which establishes an active connection to the target hosts to discover potential attack vectors in the system, and the sa

Top five open source intelligence (OSINT) tools [updated 2021]

In this article, we will look at the top five open-source intelligence tools.  Before we jump directly into the tools, it is essential to understand what