
File | |
---|---|
1412328366wpdm_PenTest_OPEN_06_2013.pdf |
TABLE OF CONTENTS:
FOR STARTERS
Pivotal Basics for Every Beginner
By Chris Berberich
Pentesting is always very hard at the beginning. People often make really trivial mistakes. Steps and suggestions in this article will help you avoid most of them and conduct a proper pentest.
FROM: Starter Kit 03/2013 ‒ Become Well-known Penetester Today
BACKTRACK
Sharpen your Axe with BackTrack
By Davide Peruzzi
Abraham Lincoln said ‘Give me six hours to chop down a tree and I will spend the first four sharpening the axe.’ This is really the basic concept and the starting point of every penetration test.
FROM: PenTest Extra 03/2013 ‒ BackTrack Compendium
Pentesting with Backtrack
By Mathieu Nayrolles, Mathieu Schmitt, and Benoît Delorme
Penetration testing, also known as pentesting, is a technique to evaluate the security of computers and networks by performing imitating attacks from external and internal threats. The pentesting process involves static and dynamic analysis of a system/network in order to reveal potential security issues resulting from improper configurations or hardware/software flaws. These attacks should be executed from the point of view of potential attackers.
FROM: PenTest Extra 3/2013 – BackTrack Compendium
Multiphase Penetration Testing: Using BackTrack Linux, Metasploit and Armitage
By Lance Cleghorn
The EC Council identifies five stages of attack that are common to cyber penetration. These stages of attack may be used to categorize incidents where a network or a host has been compromised. Considering that these stages are common to real attacks, they are used by ethical hackers to conduct penetration testing. An ethical hacker or a white-hat hacker may use these steps in order, or may selectively choose the steps that work best for the particular vulnerability.
FROM: PenTest Extra 03/2013 ‒ BackTrack Compendium
SMARTPHONES
Mobile Applications: The True Potential Risks ‒ Where to Look for Information When Performing a Pentest on a Mobile Application
by Michael Trofi and Duane Schleen
This article mainly covers what security professionals should be looking for when performing a penetration test of a mobile application. Although, similar data concerns exist on the Android and Windows 7-based phones, the main discussion here concentrates on data found for iOS applications.
FROM: PenTest WebApp 01/2013 ‒ Build Your Own Pentesting Workshop (TO BE RELEASED)
Employers: Smartphone Pentesting could Save your Business
By Jane Andrew
Are you an owner of a company? If so, you cannot miss this article. It will help you improve your firm security and avoid unneccessary expenses.
FROM: Starter Kit 03/2013 ‒ Become Well-known Penetester Today
ANTI-VIRUS SOFTWARE
AV Evasion: Bypassing AV Products and Protection Against It
by Fadli B. Sidek
AV evading techniques are getting better and smarter by the day, and having just an Anti‒Virus and Anti‒Spyware application is insufficient to protect our machines from additional angles of threats.
FROM: PenTest Regular 05/2013 (TO BE RELEASED)
File | |
---|---|
1412328366wpdm_PenTest_OPEN_06_2013.pdf |