Email Alerts
-
How to use hping to craft packets
A packet crafting tool that's been around for a long time, hping can be used to test if ports are open, as well as for firewall testing. Learn how to use hping in this tutorial. Tip
-
What to do with network penetration test results
It takes a lot of time and effort to plan and conduct an enterprise network penetration test, but the work doesn't stop there. Contributor David Meier explains how to conduct an analysis of pen testing results. Tip
-
Screencast: BackTrack 4 offers an arsenal of penetration testing tools
Peter Giannoulis of TheAcademyPro.com and TheAcademyHome.com demonstrates BackTrack 4, the final version of the venerable pen-testing live Linux-based CD distribution. Tip
-
Screencast: Samurai offers pen-testing nirvana
Peter Giannoulis of The AcademyPro and The Academy Home demonstrates the Samurai Web Testing Framework, a free, live Linux distro pre-configured to function as a stand-alone Web pen-testing environment. Tip
-
Cracks in WPA? How to continue protecting Wi-Fi networks
German researchers recently described a Wi-Fi Protected Access (WPA) flaw that seemed to put the security of the popular wireless protocol in question. Network security expert Mike Chapple explains the vulnerability, but argues that the standard defe... Tip
-
Screencast: Collecting metadata with Metagoofil
Peter Giannoulis explains how Metagoofil, an information gatherer that extracts metadata from public documents, can be extremely valuable when investigating a target network. Tip
-
Screencast: How to use Wikto for Web server assessment
Peter Giannoulis demonstrates what kinds of website and Web server information can be found using the free Wikto tool. Tip
-
Screencast: Penetration testing with Metasploit
Peter Giannoulis of Bones Consulting demonstrates how the tool can be used to test commercial and custom-made applications, servers and operating systems. Tip
-
Google hacking exposes a world of security flaws
In this tip, contributor Scott Sidel examines Goolag, a open source security tool that assists security pros in finding flaws in websites through Google hacking. Tip
-
Inside application assessments: Pen testing vs. code review
Learn the advantages and limitations for two of the most popular application security offerings: penetration testing and code review. Tip
Security Management Strategies for the CIO