Kali Linux 2018: Assuring Security by Penetration Testing

[Ebook] Kali Linux 2018: Assuring Security by Penetration Testing

Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its fourth edition Key Features Rely on the most updated version of Kali to formulate your pentesting strategies Test your corporate network against threats Explore new cutting-edge wireless penetration tools and features Book Description Kali Linux is a comprehensive penetration testing … Continue reading [Ebook] Kali Linux 2018: Assuring Security by Penetration Testing

libro kali linux

[IT] Come Diventare Hacker: Kali Linux, Comandi e Tools per l’hacker

Questo libro è scritto per chiunque voglia avere sottomano tutti i comandi e i tool più utili di Kali Linux. 7 Guide comando per comando inclusa l'installazione e la personalizzazione. Utile anche per chi voglia cimentarsi in questa materia. Kali Linux è una distribuzione basata su Debian GNU/Linux, pensata per l'informatica forense e la sicurezza … Continue reading [IT] Come Diventare Hacker: Kali Linux, Comandi e Tools per l’hacker

How to add external modules to metasploit-framework

Sometimes, some exploits are released as modules for metasploit-frameworks on online databases such as exploit-db but are not added to the metasploit database. So, how to add them manually? Simple, it is necessary that the form is written in ruby, and therefore has extension ".rb". Open console metasploit: sudo service postgresql start msfconsole IIIIII dTb.dTb … Continue reading How to add external modules to metasploit-framework

[CTF] JordanInfosec – JIS-CTF: VulnUpload

Jordaninfosec-CTF01 is a very simple vulnerable machine, it does not require many notions of penetration testing, but it is a good way to start the study of penetration testing and to learn the research methodology in addition to the CTF (Capture the Flag) mechanism. In this guide we will go through each step step by … Continue reading [CTF] JordanInfosec – JIS-CTF: VulnUpload