- Register, accept the Disclaimer and choose subscription option.
By choosing the Free Account option you will only be able to download the teaser of each issue.
- Verify your account using the verification link sent to your email address.
- Check the password sent on your email address and use it to log in.
- Click the download button to get the issue.
IMPORTANT: the registration on the website includes subscription to our newsletter.
VMware vSphere Security and Metasploit Exploitation Framework
by Duane Anderson
VMware vSphere is another layer in your overall environment to attack. In this article you will learn some of the threats, how to mitigate them and how to attack that virtual layer.
Android Vulnerability Analysis with Mercury Framework
by Patrik Fehrenbach
Nowadays, users save more sensitive data on their smartphones than on their desktop pc’s. This article will have a close look on Android applications, how to analyze them and what vulnerabilites could affect user data.
Exploit Frameworks: BeEF
by Robert Haist
Have a look at your computer. Do you have a webcam? And a microphone? I bet there also is a big sticker covering them. No? … I would suggest buying one now.
Metadata: Your Friend or Foe – An Analysis with Foca
by Vivek Veerappan
One of the most important steps in Pentesting is information gathering. Knowing where to look for vulnerabilities saves precious time in pentesting. Imagine a tool which can give you the network tree, including the system names, OS and version of software’s used, email ids and sometimes passwords, and all these without performing any complex pentesting process. That’s exactly what this article is about.
My Experiences with the Metasploit Framework: From N00b to Contributor
by Joshua Smith
Ever wanted a tour of the Metasploit Framework (MSF)? If you have basic command line skills, and a working knowledge of networking and how hosts are compromised, you can take a guided tour from someone who started as a tourist and ended up as a tour guide. You’ll see how you can use MSF for all sorts of tasks and learn to write your own magic for yourself or to share. The tour doesn’t make every possible stop, but you’ll be informed, entertained, and well on your way to mastering Metasploit.
Cyber Attack Management with Armitage
by Abhinav Singh
Metasploit has now become the industry standard product for penetration testing. Armitage leverages the functionality of Metasploit and provides a complete graphical interface to it. The article describes how to set up a penetration testing scenario using Armitage. It moves swiftly from basics to some advances concepts and covers several important aspects of penetration testing using Armitage.
Command Your Windows
by Remus Ho
Is command line obsolete in Windows systems? What can you do if have no GUI? How useful are Windows command to a hacker or pen-tester when they obtain a remote shell to a Windows machine?
MS Internet Explorer Same ID Property Remote Code Execution Vulnerability
by Praveen Parihar
In this article you will learn about concepts behind Internet Explorer memory corruption, what kinds of bypass techniques are used to launch buffer overflows, heap based and stack overflow attacks and return oriented programming concepts to exploit remote code execution vulnerabilities.
by Marc Gartenberg
In this installment we’ll take a look at Chapters 3 through 6, which detail the requirements for training, classification and markings, safeguarding, and policies for meetings and visits. We’ll review these from a high-level in order to present a broad view of the landscape and the aspects that the NISPOM providing policy for.
The Uncooperative and Politically Connected
by Dean Bushmiller
There are three types of people in business: delivery, sales, and administrative. When we start to get layers of administrative people, they might feel disconnected from the mission of the organization. The higher that administrator is, the more impact they have on the test.
Save the Database, Save the World! – Chapter 7
by John B. Ottman
You can buy this issue or buy subscription and get access to all issues on our website.
Before you can buy this single issue, you must register for free account on our website.