penetration testing

Hatforce_wheel

Hatforce – New Penetration Testing Platform

Hatforce is a crowd-sourcing penetration testing platform for Mobile, Web and Desktop applications which rewards ethical hackers for performing IT security tests for clients. The concept is simple: a client registers on Hatforce.com and offers a reward, let’s say 80…

back track cover

BackTrack 4: Assuring Security by Penetration Testing

BackTrack 4: Assuring Security by Penetration Testing By Shakeel Ali, Tedi Heriyanto Publisher: Packt http://link.packtpub.com/Ks5ViS 30% DISCOUNT for Hakin9 WHOLE SUBSCRIBERS!!! Add the eBook to the shopping cart on the Packt website. Eenter the CODE: ‘opbgsms‘ in the ‘Enter Promotion…

penetration tester's open source cover

Review of Penetration Tester’s Open Source Toolkit

Review of Penetration Tester’s Open Source Toolkit 3rd Edition By Michael Munt www.syngress.com   There are so many different varieties of penetration testing tools available, and the commercial versions of these can be very expensive and not always that easy…

9781597496278_Faircloth

Penetration Tester’s Open Source Toolkit, Third Edition

Penetration Tester’s Open Source Toolkit, Third Edition By Jeremy Faircloth Publisher: Syngress July 2011 U.S., August 2011 EMEA www.syngress.com Description Great commercial penetration testing tools can be very expensive and sometimes hard to use or of questionable accuracy. This book…

cover_basics Hacking

The Basics of Hacking and Penetration Testing

The Basics of Hacking and Penetration Testing By Patrick Engebretson Publisher: Syngress July 2011 U.S., September 2011 EMEA www.syngress.com Description The Basics of Hacking and Penetration Testingserves as an introduction to the steps required to complete a penetration test or…

Hacking Trust Relationships

This article is the first in a series of six, which covers the topic of hacking trust relationships. This first article focuses specifically on Information Gathering against a target system, in order to identify potential trust relationships. Author: THOMAS WILHELM…

Pentest Labs Using Live CDs

For those individuals interested in learning how to perform penetration testing, they quickly realize there are many tools to learn, but almost no legal targets to practice against – until now. De-ICE.net has developed LiveCDs that simulate fully-functional servers that…

Auditing Oracle in a Production Environment

This paper is based on real penetration testing of Oracle servers on HP-UX systems and the methodology the auditor must follow in order to combat the stringent situations which present themselves. We will dissect the errors and explore the ways…

IPsec Policies

Switch Overview. The Data Link Layer, or Layer 2 of the OSI model is the protocol layer that provides the functional needs for data transportation between multiple nodes on a network. Ethernet, PPP, and Frame Relay are examples of data…

Training – the Security Minefield

Learning something new is a wonderful thing. However, with all the security training on offer right now, how do you know what’s right for you ? Author: CHRIS RILEY Source: Hakin9 1/2009 https://hakin9.org Over the past few years, I’ve been slowly re-inventing my…