"Penetration testing" tag

Secure Your Career with ‘Ethical Hacking’!

In the dark alleys of virtual space, cyber crooks, a.k.a. hackers, are persistently coming up with novel attacks to knock out even the latest anti-fraud defences. If a report released by software security…

IPsec VPN Penetration Testing

IPsec VPN Penetration Testing with BackTrack Tools

This article outlines the value of penetration-testing VPN gateways for known vulnerabilities and also shows you how to prevent a breach into the internal network. IPsec is the most commonly used technology for…

Samurai

Web Application Penetration Testing Using Samurai

This article introduces you to penetration-testing of Web applications. Also included is some hands-on work with a Web-testing framework called Samurai. Penetration testing, affectionately called pen-testing, involves testing a piece of software, or…

The user interface of msfconsole

Metasploit: The Exploit Framework for Penetration Testers

Today, the Metasploit Framework is considered the single most useful auditing tool that is freely available to security professionals and penetration testers. It has a wide array of commercial-grade exploits, an extensive exploit-development…

All published articles are released under Creative Commons Attribution-NonCommercial 3.0 Unported License, unless otherwise noted.
Open Source For You is powered by WordPress, which gladly sits on top of a CentOS-based LEMP stack.

Creative Commons License.