Lorem ipsum dolor sit amet, elit eget consectetuer adipiscing aenean dolor

penetration testing Tag

Boldly going where no man has gone before, the Kirk Ransomware brings so much nerdy goodness to the table that it could make anyone in IT interested. We have Star Trek, Low Orbital Ion Cannons, a cryptocurrency payment other than Bitcoin, and a decryptor named Spock! Need I say more? Discovered today by Avast malware researcher Jakub

In my previous post “Pentestit Lab v10 - The Mail Token”, we attained usernames through Intelligence Gathering, brute forced the SMTP Service, attained login credentials, and scored our first token. Today we will take our first steps at compromising the Global Data Security website - which will include the following: Mapping the Attack Surface

On Tuesday 7 March 2017, WikiLeaks began its new series of leaks on the U.S. Central Intelligence Agency. Code-named "Vault 7" by WikiLeaks, it's the largest ever publication of confidential documents on the agency. The first full part of the series, "Year Zero", comprises 8,761 documents and files from an isolated, high-security network situated

In my previous post “Pentestit Lab v10 - Introduction & Layout”, I covered the Network layout and VPN Connection. Today I will be covering the first steps taken to attack the lab - which will include the following: Fingerprinting the GW machine Carrying out Intelligence Gathering Brute Forcing SMTP Finding the Mail Token There are 13 Tokens in total scattered

Distributed denial-of-service (DDoS) attacks have the same goals, but the implementation is much more complex and wields more power. Whereas a DoS attack relies on a single system or a very small number of systems to attack a victim, a DDoS attack scales this up by having several attackers go after a victim.

    This reference guide describes every tool one by one and is aimed at anyone who wants to get familiar with digital forensics and penetration testing or refresh their knowledge in these areas with tools available in Kali Linux • Note! I’ve tried to gather as much information as possible, however, even despite that, some

Ever wondered how it feels like to hack a company? To breach their systems, traverse their network, and gain complete and total control of their domain - but all in bounds of legality? Well, look no longer! I've been scouring the inter-webs looking for decent resources that I can use to practice and hone