penetration tester

penetration tester's open source cover

Review of Penetration Tester’s Open Source Toolkit

Review of Penetration Tester’s Open Source Toolkit 3rd Edition By Michael Munt www.syngress.com   There are so many different varieties of penetration testing tools available, and the commercial versions of these can be very expensive and not always that easy…

9781597496278_Faircloth

Penetration Tester’s Open Source Toolkit, Third Edition

Penetration Tester’s Open Source Toolkit, Third Edition By Jeremy Faircloth Publisher: Syngress July 2011 U.S., August 2011 EMEA www.syngress.com Description Great commercial penetration testing tools can be very expensive and sometimes hard to use or of questionable accuracy. This book…

9781597496117

Review of Practical Lock Picking

Review of Practical Lock Picking A Physical Penetration Tester’s Training Guide By Michael Munty www.syngress.com   Some of you are likely to be thinking what does Lock Picking have to do with IT Security but you need to think from…

9781597496117

Practical Lock Picking

Practical Lock Picking By Deviant Ollam Publisher: Syngress August  2010 U.S.,  September 2011 EMEA www.syngress.com Description For the first time, Deviant Ollam, one of the security industry’s best-known lockpicking teachers, has assembled an instructional manual geared specifically toward penetration testers….

Exploiting Software

Hakin9 Extra 1/2011 – Exploiting Software

Ask the Social Engineer: Exploitation of the Human OS – The Human Buffer Overflow by Chris Hadnagy Total domination is the goal for a penetration tester in every pentest – To utterly hack the company and demonstrate their true exposure…

ninja cover

Review of Ninja Hacking

Review of Ninja Hacking Unconventional Penetration Testing Tactics and Techniques By Michael Munt www.syngress.com   This is an unusual title for a book that is being aimed at the Security community and when I first looked at it i thought…

ninja cover

Ninja Hacking

Ninja Hacking By Thomas Wilhelm, Jason Andress Publisher: Syngress October 2010 U.S., November 2011 EMEA www.syngress.com Description Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today’s ninja, the hacker? As a penetration…

Hacking ASLR & Stack Canaries on Modern Linux

This article will demonstrate methods used to hack stack canaries and Address Space Layout Randomization (ASLR) on modern Linux kernels running the PaX patch and newer versions of GCC. Author: STEPHEN SIMS Source: Hakin9 5/2009 https://hakin9.org WHAT YOU SHOULD KNOW… Readers should have…

Hacking Through Wild Cards

This paper sheds light on the usage of wild characters that lead to hacking. The wild characters are used effectively in a different sphere. The inappropriate use of wild characters can lead to misconfiguration of parameters thereby resulting in a…