Top

Tag: Pentesting

2017
2016
23 Oct

A non-exhaustive list of topics to be covered include: Information Gathering – OSINT, DNS, SNMP etc. Pentesting Network Components – Router, Switch, Firewall, IDS/IPS Pentesting Windows Environments – domain controllers, pass-the-hash, active directory etc. Pentesting Linux Environments Pentesting Mobile Application[…]

23 Oct

This course focuses on the iOS platform and application security and is ideal for pentesters, researchers and the casual iOS enthusiast who would like to dive deep and understand how to analyze and systematically audit applications on this platform using[…]

23 Oct

This course will cover USB in detail with an emphasis on understanding USB Mass Storage devices (also known as flash drives or thumb drives).By the end of this course students will know how to sniff USB traffic using open source[…]

23 Oct

This course is ideal for penetration testers, security enthusiasts and network administrators. A non-exhaustive list of topics to be taught includes: Metasploit Basics and Framework Organization Server and Client Side Exploitation Meterpreter – Extensions and Scripting Database Integration and Automated[…]

23 Oct

In this course, we will be learning how to use Javascript for Pentesting.

17 Sep

Five Questions to Ask When You’ve Been Compromised 1. Which systems and data were affected? 2. How did they do it? 3 . Who did this to us? 4. Is it really over? 5. Can it happen again? Modern security[…]

15 Sep

Anyone who has even the slightest amount of contact with the internet is familiar with the scenario: An email or actual piece of mail arrives from a company who apparently handles some part of your connected life. The letter calmly[…]

2015
27 May

It is an art to performing a pen-test. There are various penetration testing methods available. Pen-testing should be an integral part of product SDLC cycle, and You need an Integrated Penetration Testing Tools and a Lab,These servers are used for[…]

End
Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

What are cookies?

Cookies are small pieces of text stored on your computer when you visit almost any website. Companies use them to:

  • Verify your identity, to ensure your security and privacy
  • Determine the browser and settings you are using to provide optimised content
  • Understand the way you navigate through websites, so firms can make improvements
  • Help site owners and third-party advertisers tailor content to your preferences

We also use social media buttons and/or plugins on this site that allow you to connect with your social network in various ways. For these to work the following social media sites including;

    • Linked In
    • Twitter
    • YouTube

will set cookies through our site, which may be used to enhance your profile on their site or contribute to the data they hold for various purposes outlined in their respective privacy policies.

GOOGLE CHROME
There are multiple levels of cookie enablement in Chrome. For more information, click here.

INTERNETEXPLORE
There are multiple levels of cookie enablement in Internet Explorer. For more information, click here.

MICROSOFT EDGE
There are multiple levels of cookie enablement in Edge. For more information, click here.

MOZILLA FIREFOX
There are multiple levels of cookie enablement in Firefox. For more informaiton, click here.

OPERA
There are multiple levels of cookie enablement in Opera. For more information, click here

SAFARI
For more information, see the Safari user guide.