Penetration Testing

Learn about Penetration Testing and tools which is used in penetration testing.

Most Important Android Penetration Testing Tools for Pentesters & Security Professionals

Android security testing is more often used by security industries to test the vulnerabilities in Android applications. Here you can find the Comprehensive Android Penetration testing tools and resource list that covers Performing Penetration testing Operation in Android Mobiles. Online Analyzers AndroTotal Tracedroid Visual Threat Mobile Malware Sandbox Appknox – not free IBM Security AppScan Mobile …

Most Important Android Penetration Testing Tools for Pentesters & Security Professionals Read More »

Password Auditing on Active Directory Databases

In this article we explore the options to acquire information from an online or offline Microsoft Active Directory database and its encryption keys. We will use this to recover the contained usernames and password hashes for password auditing or penetration testing purposes. The database Microsoft stores the Active Directory data in tables in a proprietary …

Password Auditing on Active Directory Databases Read More »

Brute Forcing Passwords with ncrack, hydra and medusa

What is Brute Forcing? A brute force attack is a trial-and-error method used to obtain information such as a user password or personal identification number (PIN). In a brute force attack, automated software is used to generate a large number of consecutive guesses as to the value of the desired data. Brute force attacks may …

Brute Forcing Passwords with ncrack, hydra and medusa Read More »

Metasploit Tutorial for Beginners (Part 1)

The Metasploit project is an open-source penetration testing platform that enables you to find and exploit vulnerabilities. In 2003, H.D. Moore created Metasploit as a portable network tool. On October 21, 2009, the Metasploit project was acquired by Rapid7. The Metasploit project helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage …

Metasploit Tutorial for Beginners (Part 1) Read More »