Dear PenTest Readers,
Our special spring edition of PenTest Magazine consists of a compilation of our TOP blog-articles. The subjects vary, so I hope that everybody will find something interesting for themselves.
In the first part of this issue, we offer you a small overview of the news and tips from the penetration testing world. You can become familiar with 10 Rules of the IT-Security. Those of you who are hesitating in taking part in any penetration testing courses will learn here why is it important to get the certifications and improve occupational qualifications.
If you are interested in hacking passwords, you will be able to acquire NTLM and LM algorithm and study the step-by-step guide of cracking a less than 7 characters password, using NTLM. You will also receive valuable tips on how to make your password more secure.
You can get absorbed by the articles that go closely into firewalls, Structured Query Language and IP Tables.
Reading further, you will find a demonstrations of various attacks over VOIP & actual VOIP Hacking as well as useful practical tips for any type of Windows user. If you are keen on how to install Smartphone-Pentest-Framework in Kali Linux, in this issue we are sharing a step-by-step tutorial divided into several parts. Also, we offer you an in-depth explanation of web applications and some cryptography tools and instructions how we should pair them off.
Have a lot of fun with exploring new penetration tools, methods and programs.
Enjoy being a part of our elite Pentesting Community. Milena Bobrowska & PenTest Magazine.