penetration testing

Hackers Crack Businesses’ Security Using Social Engineering

A group of white hat hackers from RedTeam traveled to the Midwest to test the systems of a major power…

8 years ago

The Infernal-Twin tool, easy hacking wireless networks

The Infernal-Twin is an automated tool designed for penetration testing activities, it has been developed to automate the Evil Twin…

9 years ago

US Army Experts Call for military bug bounty program AVRP

US Army Military experts urge the establishment of an Army Vulnerability Response Program (AVRP),  a sort of military bug bounty…

9 years ago

PowerMemory, how to extract credentials present in files and memory

This post explains how to use the PowerMemory script to reveal the passwords used by users of the computers running…

9 years ago

How hackers use Robots txt to harvest information

The penetration tester Thiebauld Weksteen has published an interesting analysis to explaine the importance of robots.txt for the hacking activities.…

9 years ago

Zero-day flaws affect Symantec Endpoint Protection

Pen Testers at Offensive Security discovered Zero-day flaws in Symantec Endpoint Protection that could be exploited to gain full system…

10 years ago

Business Intelligence – Intro to reconnaissance

Exploring the Business Intelligence module proposed by the online course of the Hacker Academy - Intro to reconnaissance phase for…

11 years ago

The Hacker Academy on Penetration Testing

Penetration testing is a skill, a profession that requests specific capabilities and the respect of strict rules. Hacking is different…

11 years ago

Cybercrime-as-a-Service, the rise of hacking services

Security expert Dancho Danchev profiled one of the numerous hacking services offered in the underground highlighting new trends in the…

11 years ago

Web Application Vulnerabilities 2013 – Context Information Security

Context Information Security  issued the report "Web Application Vulnerability Statistics 2013" that provides statistic on Web Application Vulnerabilities based on data…

11 years ago

This website uses cookies.