New Archives - Pentestmag

New

Andrea Cavallini OfficialNew

SDR - Starting with Signal Hacking

Not all sensible data is exposed on the Internet through the IP transport layer. Some particular data are transmitted using …

Jun 03,2023

6 min read

Nayana MG OfficialNew

WIPER Malware

Nayana MG ABSTRACT: Cyber war is an emerging digital threat which sets its root firmly without even giving a chance …

Jun 02,2023

24 min read

Exploring the Boundaries: Legal and Ethical Considerations of Generative Artificial Intelligence in Penetration Testing and the CFAA

Victoria Walters and Yu Cai, Michigan Technological University The progress we've seen in Artificial Intelligence (AI) over recent years has …

Jun 02,2023

7 min read

Bastian Angerstein OfficialNew

Penetration Test Need-To-Know

What is a Penetration Test? A penetration test (also known as a pen test) is a simulated attack on an …

Jun 01,2023

30 min read

Andrea Cavallini OfficialNew

SDR - Starting with Signal Hacking

Not all sensible data is exposed on the Internet through the IP transport layer. Some particular data are transmitted using …

Jun 03,2023

6 min read

Nayana MG OfficialNew

WIPER Malware

Nayana MG ABSTRACT: Cyber war is an emerging digital threat which sets its root firmly without even giving a chance …

Jun 02,2023

24 min read

Exploring the Boundaries: Legal and Ethical Considerations of Generative Artificial Intelligence in Penetration Testing and the CFAA

Victoria Walters and Yu Cai, Michigan Technological University The progress we've seen in Artificial Intelligence (AI) over recent years has …

Jun 02,2023

7 min read

Bastian Angerstein OfficialNew

Penetration Test Need-To-Know

What is a Penetration Test? A penetration test (also known as a pen test) is a simulated attack on an …

Jun 01,2023

30 min read

Rausson Course

Creating Advanced Ransomware with Golang (W51)

In this course, you will develop a hybrid ransomware using, that is, with two encryptions RSA and AES with a programming language that is gaining a lot of strength - Golang

May 12,2023

6 min read

Mastering Splunk: A Comprehensive Guide (W50)

"Mastering Splunk: A Comprehensive Guide" is a comprehensive and hands-on course that covers all aspects of the Splunk platform, from the fundamentals to advanced topics. The course is designed to provide students with the knowledge and skills to effectively use Splunk to analyze and visualize data in their personal and professional lives.

Mar 31,2023

18 min read

faiyaz Course

The Most Notorious Bugs: SQL Injection & XSS (W49)

This course is designed for those who are looking to move their web application penetration skills to the next level! Working from scratch, this course aims to provide comprehensive knowledge of two of the most notorious and common vulnerabilities, SQL Injection and Cross Site Scripting.

Mar 22,2023

6 min read

OSINT Tools & TTPs for Pentesters and Red Teamers (W48)

In this course, Eva Prokofiev, the prominent expert in the CTI and OSINT areas, will share with you her know-how and point of view on how to examine a target not only from a "pentester's angle”, but also from other cybersecurity perspectives.

Feb 27,2023

10 min read

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013