Articles by Tag #pentest

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

Setting Up Your Flipper Zero: A Step-by-Step Guide for Beginners

Welcome to the world of Flipper Zero! Whether you're a tech enthusiast or a cybersecurity hobbyist,...

Learn More 8 0Aug 19 '24

Key Differences Between Vulnerability Assessment and Penetration Testing

Key Differences Between Vulnerability Assessment and Penetration Testing While...

Learn More 5 0Jun 9

10 Livros para Aprendizado Avançado de Pentest e Segurança (Hackers)

Explorar o mundo do pentest e da segurança cibernética é uma jornada emocionante e desafiadora....

Learn More 3 0Aug 8 '24

Git Tales: Part 2 - Demons in the Cloud

Part 2 of 3 in Git Tales Series Enter fullscreen mode Exit fullscreen mode ...

Learn More 3 0May 9

Git Tales: Secrets in the Shadows

Part 1 of 3 in Git Tales Series Enter fullscreen mode Exit fullscreen mode ...

Learn More 2 0Apr 29

How i Became a Pentester | Como me Tornei um Pentester

🇬🇧 - Hello, nice to meet you, my name is Gustavo and I’m a Pentester for about one and a half years,...

Learn More 1 0Apr 29

Criando um Port Scan com Python3

Introdução No artigo de hoje, vamos desenvolver um Port Scan utilizando Python 3, mas,...

Learn More 1 0Apr 29

Пентестинг: основы, преимущества и применение

Пентестинг представляет собой комплексное тестирование, в ходе которого специалисты атакуют системы...

Learn More 1 0Jul 1

What is a polyglot in Hacking

Polygloting in language is talking two languages or more Polygloting in hacking...

Learn More 0 0Sep 13 '24

Understanding a Netcat-Based Reverse Shell Using FIFO

One-liners like the following are often used in offensive security contexts to establish shell access...

Learn More 0 0May 3

[REPOST] Installing Genymotion for Android App Pentesting: The Definitive Guide

With the growing use of mobile applications, the security of these applications has become a key...

Learn More 0 0May 2

2FA Bypass via Response Manipulation

You know that vulnerability that says "the developer must have the intention to collaborate with an...

Learn More 0 0Feb 24

Why “Think Like an Attacker” is harmful FT: Threat Modeling?

Before we start , just quick reminder it’s Threat Modeling not Modelling. Now let recall basic...

Learn More 0 0Feb 13

Attacking WebDAV Protocol

WebDAV (Web-based Distributed Authority Version) is a legacy protocol that can be defined as an...

Learn More 0 0Mar 9

🔐 Top 8 API Pentesting Tools Every Developer & Security Pro Should Know

APIs are the unsung heroes of modern apps—but they also open doors to attackers. Whether you’re...

Learn More 0 0Apr 10

Explorando o Metasploit Framework: A Ferramenta Essencial para Testes de Penetração e Segurança

O Metasploit Framework é uma das ferramentas mais poderosas e amplamente utilizadas no arsenal de um...

Learn More 0 0Jul 25 '24

Por que as Empresas Estão Desesperadas por Ethical Hackers em 2024 e Como Você Pode Se Preparar para essa Oportunidade.

Primeiramente explicando para você que pode não saber o que é um Ethical Hacker ou Hacker Ético. Sâo...

Learn More 0 0Aug 26 '24

Mastering Cybersecurity: A Guide to Pentest+, CySA+, and SecurityX Certifications

Introduction As cyber threats continue to evolve, organizations require skilled...

Learn More 0 0Mar 27

How To Find Zombie Hosts With Nmap?

For educational purposes only If you are familiar with Nmap, you probably already know that scanning...

Learn More 0 0Oct 29 '24

Web Cache Deception Attacks

Web Cache Deception is a vulnerability first described in 2017. It occurs when a caching system —...

Learn More 0 0May 9

Why Penetration Testing is Essential for Modern Businesses

In today’s digital-first world, every business is at risk of cyberattacks — regardless of size or...

Learn More 0 0Jun 16

Next.js Middleware Broken Access Controls

Recently, an Authorization Bypass vulnerability was discovered in the Next.js framework (one of the...

Learn More 0 0Mar 27

Basics of Pentest on AWS Environment

Basics of Pentest on an AWS Environment Preparation and Authorization a. Obtain...

Learn More 0 0Mar 24

Misusing OAuth 2.0 Client Credentials in Public Apps — A Security Breakdown

Public-facing apps like React, Flutter, or plain JavaScript often make a critical OAuth mistake: they...

Learn More 0 0Jul 2

You do not know, what you do not know.

This can be enlightening to those who want to pursue knowledge on varying levels. Also, it can help...

Learn More 0 0Sep 10 '24