alexa

Category: Vulnerability Testing

penetration testing phase II
13Nov, 2018

Various Phases of Penetration Test Kill Chain Model: Understanding Penetration Testing Basics: Part 2

In the earlier post, we saw various penetration testing kill chain models and how to map tools to the penetration tests. In this article, we will look into some of these tools and techniques to position the Raspberry Pi in order to conduct a successful penetration test. Addition of non-standard tools to arsenal Even though […]

penetration testing
05Nov, 2018

Various Phases of Penetration Test Kill Chain Model: Understanding Penetration Testing Basics: Part 1

What is Kill Chain Model? Kill Chains have been used for many years in the defence industry to describe the phases of an activity and help outline what each phase does, how to enter those phases, and how to exit them. Kill Chains are an adapted, action-focused version of the value chain analysis that Michael […]

Penetration Testing
30Aug, 2018

Penetration Testing for Beginners

In common parlance, penetration testing is often defined as an authorized and legal attempt to disclose exploits in systems/applications in order to make them more secure. Penetration testing generally involves searching for weaknesses and providing POC (i.e. proof of concept) attacks to validate the significance of vulnerabilities/flaws in the system. A well-defined penetration test also […]

Security Testing
06Jun, 2018

Top 10 best Web application Security Testing Tools

Web application security is of utmost importance in these times due to rising threat of hackers and data leaks. So, in order to avoid this security of web application is really important. Web application security scanners is a programme which performs testing on web application and identifies security vulnerabilities. They just perform functional testing without […]