PenTest: Penetration Tests on Wi-Fi Networks
Dear PenTest Readers, We would like to present you our newest issue that will focus on Wi-Fi pentesting and security. …
Read MorePenTest: Mobile Security Architecture
Dear PenTest Readers, We know it’s summertime and probably many of you are enjoying your holidays or still thinking where …
Read MorePenTest: Software Exploitation - Web App Hacking
Dear PenTest Readers, We would like to proudly present you the newest issue of PenTest. We hope that you will …
Read MorePenTest: Build your own Pentest Lab
Dear PenTest Readers, We would like to proudly present you the newest issue of PenTest. We hope that you will …
Read MoreEffectively Measuring and Communicating PenTest Results- Workshop eBook
In this e-book you will find text materials presented in the course “Effectively measuring and communicating pentest results. A CISO …
Read MorePenTest: Bulletproof Your Docker
Dear readers, We would like to present you our newest issue. We hope that you will find many interesting articles …
Read MorePenTest: Intelligent fuzzing techniques
Dear readers, We would like to present you our newest issue. We hope that you will find many interesting articles …
Read MorePenTest: Brothers in Arms: Pentesting and Incident Detection
Dear Reader, We offer to your attention our new issue: ‘Brothers in Arms: Pentesting and Incident Detection’. In this full …
Read MorePenTest: Playing with web scanners
Dear PenTest Readers, We would like to proudly present to you the newest issue of PenTest. We hope that you …
Read MorePenTest: RawPOS Malware: An Intruder's Toolkit
Dear Reader, We offer to your attention a new issue of the PenTest Magazine. On more than 100 pages we …
Read More