Blog Archives - Pentestmag

How Pen-testing Can Help Prevent Insider Threats

Anastasios Arampatzis Risks assessed during a penetration test (pen-test) generally focus on attacks outside the information system. Indeed, a classic …

Jul 06,2023

6 min read

PMIII, a Proxmark3 revisited (or how to make your device heavy)

When I first borrowed the Proxmark3.0 X from @unrooted, the tinkerer part of me decided to do something with it, …

Mar 30,2023

5 min read

AppSec Tales XII | XSS

  INTRODUCTION The article describes how to test the application to find Cross-Site Scripting vulnerabilities. The advice in this article …

Mar 23,2023

59 min read

Crack SSH Private Key with John the Ripper

Crack SSH Private Key with John the Ripper by Anastasis Vasileiadis The SSH private key code should not be just …

Feb 07,2023

10 min read

Larbi OUIYZME OfficialNew

Setting Up a Radio Frequency Penetration Testing Lab: A Comprehensive Guide

Introduction The advent of wireless technologies, from mobile phones to Wi-Fi, satellite communications, and even automobiles, has established radio frequencies …

Sep 29,2023

16 min read

Mariana Gouveia OfficialNew

CYBER THREAT INTELLIGENCE: A LIGHT THAT SHINES IN THE DIGITAL UNDERWORLD

INTRODUCTION In today's technology-driven world, cybersecurity has emerged as a key priority. However, just securing systems and data is no …

Sep 28,2023

17 min read

Enoch Anbu Arasu OfficialNew

API Penetration Testing: Tools, Techniques and Security Practices

Overview As we live in a digital era with rapid development of Application Programming Interfaces (API), safeguarding your application data …

Sep 28,2023

18 min read

Gokce Gulsun OfficialNew

Honeypot Technology: Comparisons, Types and Importance for Cyber Security

Honeypot technology holds significant importance in today's technology-driven world, serving as a crucial tool for safeguarding networks and monitoring evolving …

Sep 28,2023

6 min read

Aerospace Cybersecurity: Satellite Hacking (W53)

This course is meant for anyone who wants to learn more about space-related cybersecurity specifically in relation to satellite systems. This course is meant for anyone of any skill level who is interested in expanding their skill set in satellite reconnaissance and vulnerability analysis.

Jul 27,2023

11 min read

AutoSec Pro: Vehicle Cybersecurity Mastery (W52)

AutoSec Pro is an immersive course diving into the world of automotive cybersecurity, providing an in-depth understanding of modern vehicle systems and their vulnerabilities. This cutting-edge course leverages a hands-on approach to exploit and mitigate potential threats while seamlessly integrating the ISO 21434 standard. Harness the power of innovation and technology as you spearhead the effort to safeguard the future of smart transportation.

Jul 20,2023

15 min read

Rausson Course

Creating Advanced Ransomware with Golang (W51)

In this course, you will develop a hybrid ransomware using, that is, with two encryptions RSA and AES with a programming language that is gaining a lot of strength - Golang

May 12,2023

6 min read

Mastering Splunk: A Comprehensive Guide (W50)

"Mastering Splunk: A Comprehensive Guide" is a comprehensive and hands-on course that covers all aspects of the Splunk platform, from the fundamentals to advanced topics. The course is designed to provide students with the knowledge and skills to effectively use Splunk to analyze and visualize data in their personal and professional lives.

Mar 31,2023

18 min read

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023