Posts Tagged Pentest
Archive
June 1, 2012 by CyberRad
Metasploit: The Penetration Tester’s Guide
Metasploit: The Penetration Tester’s Guide is written by Dave (ReL1K) Kennedy, Jim O’Gorman (_Elwood_), Devon Kearns (dookie2000ca), and Mati Aharoni (muts). This book is an essential read for anyone looking to get into the field of Penetration Testing as well as seasoned veterans. There are a ton of examples through out the book that make […]Archive
April 15, 2012 by CyberRad
Google Hacking
Google Dorks are advanced search parameters that you can use with Google’s search engine to narrow down a search. Google Hacking is the art of using Google Dorks to find specific information on Google’s databases. For example finding a known vulnerable version of a web application.Archive
January 17, 2012 by CyberRad
Going Phishing with the Social Engineering Toolkit
Social Engineering Toolkit (SET) is a social engineering pen testing framework created by Dave (ReL1K) Kennedy. SET contains numerous tools to help pen testers test the human element during a security engagement.Archive
August 12, 2011 by CyberRad
Cracking the wireless network using aircrack-ng
Aircrack-ng is a suite of programs that allow for auditing of IEEE 802.11 networks. Below I will go over using the Aircrack-ng suit in Backtrack 5 to capture and crack WEP and WPA.Archive
May 16, 2011 by CyberRad
Using Armitage, An attack management tool for Metasploit
Armitage is a great attack management tool for Metasploit. Armitage shows a graphical representation of your attack as you are putting it in motion. Armitage also allows for Red Teaming by allowing your team a way to collaborate an attack in the same Metasploit session.Archive
May 12, 2011 by CyberRad
Backtrack 5 is here!
Just in case you missed it Backtrack 5 has been released. Download it here.Archive
May 10, 2011 by CyberRad
PTES – Penetration Testing Execution Standard
Penetration Testing… What is it? To most companies, that either choose or are forced to get one, the image of Uber-hackers defiling their business critical systems comes to mind. Yes, an Uber-hacker should be expected but this isn’t always the case. There are a number of disreputable firms out there that run a Nessus scan […]Archive
May 5, 2011 by CyberRad
Using Netcat, the TCP/IP swiss army knife
Netcat has been called the TCP/IP swiss army knife and rightfully so. It can act as a service by listening for a connection, a client and connect to open ports, a port scanner, a tool used to fingerprint a connectable service, and much more. In this article I will touch on handful of these abilities.Archive
April 11, 2011 by CyberRad