• LOGIN
    • No products in the cart.

Login

Retrieve Password
Back to login/register

pentest

28

Sep'16

PenTest: The Power of Python

Dear PenTest Readers, We would like to proudly present to you the newest issue of PenTest. We hope that you …

Read More

31

Aug'16

PenTest: Security Audit Methodologies

  Dear PenTest Readers, We would like to proudly present you the newest issue of PenTest Magazine. In this issue we …

Read More

22

Aug'16

Bug Bounty Programs & mobile pentesting: Apple vs. Android

With so many data breaches and hackers breaking into systems, companies constantly scan and improve their code, to make it …

Read More

19

Aug'16

Exploiting blind SQL injections in ‘UPDATE’ and ‘INSERT’ statements without stacked queries by Sina Yazdanmehr

Overview The SQL injection attack was introduced around 1998 for the first time. This high-level risk vulnerability can be found …

Read More

16

Jan'16

PenTest OPEN: Penetration testing and vulnerability analysis. Trends in 2016

We would like to proudly present you the newest issue of PenTest Open, which is free to download for everyone …

Read More

30

Nov'15

Workshop’s E-Book: IDS Systems, VoIP Systems, XSS Vulnerability, Metasploit Framework

Inside IDS systems with SNORT and OSSIM: use your knowledge of network architecture and hardware to customize placement of IDS sensors and sniff traffic off the wire. Exploiting VoIP Systems: theoretical and practical aspects about VoIP attacks and relatives countermeasures. Journey In The World of The XSS: Impress your customers with awesome Proof of Concept far beyond the classic pop-up. Metasploit Framework: how to apply the incredible capabilities of the Metasploit Framework in a comprehensive penetration testing and vulnerability assessment regimen, according to a thorough methodology for performing effective tests.

Read More

13

Feb'14

Configure Your Machine for Pentesting

Dear PenTest Readers! This issue will teach you how to configure your computer in order to correctly perform a penetration …

Read More

06

Feb'14

Vulnerability Analysis: Cisco Tools

Dear PenTest Readers! The focal point of this issue will be analyzing vulnerabilities with Cisco tools. You will yearn how …

Read More

10

Jan'14

Packet Analyzers

Dear PenTest Readers, This issue will be devoted to packet analyzers. Here together with our experts we’ll provide you with …

Read More

10

Jan'14

Power Line Communication

Dear PenTest Readers, The focal point of this issue will be devoted to Power Line Communication system: a component of …

Read More