Penetration testing

Penetration testing
A penetration test or “pentest” is a human-driven assessment of an organization’s security. One or more pentesters will be engaged by an organization to iden

January 11, 2021
Howard Poston
Penetration testing
Introduction While penetration testing and Red Teaming are crucial to check a system’s security and to validate potential entry-points in the infrastructure

October 13, 2020
Pedro Tavares
Penetration testing
Fuzzing is a black-box software testing technique and consists of finding implementation flaws and bugs by using malformed/semi-malformed payloads via automa

September 30, 2020
Pedro Tavares
Penetration testing
The SQLMap tool can be found in every penetration tester's toolbox. It is one of the most popular and powerful tools when it comes to exploiting SQL injectio

September 26, 2020
Satyam Singh
Penetration testing
The Sophos XG firewall vulnerability The Sophos XG Firewall recently had a publicly-reported zero-day vulnerability. The vulnerability in question was an SQ

September 24, 2020
Howard Poston
Penetration testing
Pentesters are apparently huge fans of colors. Different roles within pentesting assignments are designated as Red Team, Blue Team, Purple Team and others. G

August 11, 2020
Howard Poston
Penetration testing
When you create a software product or build a service or create a platform, it’s a good idea to make sure it is secure. The data we generate is feeding the c

November 20, 2019
Susan Morrow
Penetration testing
Introduction There is an old saying that goes “a picture is worth a thousand words.” In many ways, this saying is true: you can learn a great deal about a p

November 04, 2019
Greg Belding
Penetration testing
Introduction The Red Team assessment is an increasingly popular method for an organization to get a realistic feel for their overall security. Organizations’

October 31, 2019
Howard Poston
Penetration testing
The importance of recommendations The Red Team’s final report is the most valuable part of the entire exercise for the client. In many cases, a Red Team is s

October 30, 2019
Howard PostonIn this series
- Top 5 Kali Linux tools for password attacks in 2025
- Top 19 Kali Linux tools for vulnerability assessments
- Kali Linux: Top 8 tools for wireless attacks
- SigintOS: Signal Intelligence via a single graphical interface [updated 2025]
- Top 10 Linux distro for ethical hacking and penetration testing
- What is penetration testing (pentesting), and how does it work? What you need to know
- What is red team testing, and how does it work? What you need to know
- Penetration testing steps: How-to guide on pentesting
- How does automated penetration testing work?
- Intelligence-led pentesting and the evolution of Red Team operations
- Red Teaming: Taking advantage of Certify to attack AD networks
- How ethical hacking and pentesting is changing in 2022
- Ransomware penetration testing: Verifying your ransomware readiness
- Red Teaming: Main tools for wireless penetration tests
- Fundamentals of IoT firmware reverse engineering
- Red Teaming: Top tools and gadgets for physical assessments
- Red teaming: Initial access and foothold
- Top tools for red teaming
- What is penetration testing, anyway?
- Red Teaming: Persistence Techniques
- Red Teaming: Credential dumping techniques
- Top 6 bug bounty programs for cybersecurity professionals
- Tunneling and port forwarding tools used during red teaming assessments
- Top tools for mobile android assessments
- Top tools for mobile iOS assessments
- Red Team: C2 frameworks for pentesting
- Inside 1,602 pentests: Common vulnerabilities, findings and fixes
- Red teaming tutorial: Active directory pentesting approach and tools
- Red Team tutorial: A walkthrough on memory injection techniques
- Python for active defense: Monitoring
- Python for active defense: Network
- Python for active defense: Decoys
- How to write a port scanner in Python in 5 minutes: Example and walkthrough
- Using Python for MITRE ATT&CK and data encrypted for impact
- Explore Python for MITRE ATT&CK exfiltration and non-application layer protocol
- Explore Python for MITRE ATT&CK command-and-control
- Explore Python for MITRE ATT&CK email collection and clipboard data
- Explore Python for MITRE ATT&CK lateral movement and remote services
- Explore Python for MITRE ATT&CK account and directory discovery
- Explore Python for MITRE ATT&CK credential access and network sniffing
- Top 10 security tools for bug bounty hunters
- Kali Linux: Top 5 tools for post exploitation
- Kali Linux: Top 5 tools for database security assessments
- Kali Linux: Top 5 tools for information gathering
- Kali Linux: Top 5 tools for sniffing and spoofing
- Kali Linux: Top 5 tools for penetration testing reporting
- Kali Linux overview: 14 uses for digital forensics and pentesting
- Explore Python for MITRE ATT&CK persistence
- Explore Python for MITRE ATT&CK defense evasion
- Explore Python for MITRE ATT&CK privilege escalation
Get certified and advance your career!
- Exam Pass Guarantee
- Live instruction
- CompTIA, ISACA, ISC2, Cisco, Microsoft and more!