Tag: ethical hacking

Tag: ethical hacking

Gathering Penetration Testing Intelligence from Network and Application Platform Configuration
June 1, 2021 Cyber defense, cybersecurity, Elearning, Online security, Penetration testing, Pentest, System security, Web frameworks admin

Network configuration refers to the process of setting a network’s controls, flow, and operation to support the network infrastructure of an organization or for an individual owner. Components of a computing network include Internet/network protocols, software or application, firewall, routers, and others that perform related tasks. Most network configurations are designed to meet communication objectives.

Read More
Gathering Information for Penetration Testing Using Search Engines Discovery and OWASP ZAP
April 20, 2021 Cyber defense, cybersecurity, Online security, Penetration testing, System security admin

Using a search engine discovery is another great option for gathering intelligence about a penetration testing target. A search engine query can be direct or indirect. The direct method is where the search engine can be sued to dig into the indexes and contents from caches. The indirect method is where sensitive information such as

Read More
Penetration Testing Information Gathering for Web Server Fingerprinting
April 15, 2021 Cyber defense, cybersecurity, Online security, Penetration testing, System security admin

Penetration has a standard life cycle, which includes intelligence gathering or reconnaissance, scanning, threat modeling & vulnerability identification, exploitation, Post Exploitation, clean up, and reporting. Different projects may rearrange the stages in different ways, but whichever they rearrange, you have to know that there are standard things to be done and in certain ways. For

Read More
Approaches to Penetration Testing
April 7, 2021 Cyber defense, cybersecurity, Elearning, Online security, Penetration testing, System security admin

The need to discuss testing is borne out of the desire to ensure the safe and secure use of the software. Almost everyone that has access to the internet uses some software or the other. The pandemic era has even made the use of computer software more prevalent than any other time since the origin

Read More