Posts tagged Pentest
Tactics to Maneuver Inside a Network: Using Kali and SSH to Pivot through your next Pentest

Today we will be maneuvering inside a customer’s network during a penetration test. Why, because we are masochists? Yes, but also because it is a key cyber tactic you need to be the elite penetration tester you claim to be in your twitter profile.

Read More
Web Hacking with Burp Suite (Part 3: The Power of a Proxy)

Why is seeing all your web application traffic and mess with it important? A single click can generate dozens of requests in the background and submit information you never see just by browsing a site. For a typical user, this is a convenience. For a security researcher, this can't be ignored.

Read More