5 pen testing rules of engagement: What to consider while performing Penetration testing

Penetration testing and ethical hacking are proactive ways of testing web applications by performing attacks that are similar to a real attack that could occur on any given day. They are executed in a controlled way with the objective of finding as man… Continue reading 5 pen testing rules of engagement: What to consider while performing Penetration testing

OpenVAS & Metasploit Integration – How to Use OpenVAS in Metasploit

Recently during an engagement, I was able to use OpenVAS in Metasploit to scan a host and conduct a test to see if the system was indeed exploitable. Here is how it was done below: […]
The post OpenVAS & Metasploit Integration – How to Us… Continue reading OpenVAS & Metasploit Integration – How to Use OpenVAS in Metasploit

WebGoat 8: An intentionally Insecure Web Application for WebApp Testing

As an instructor, from time to time to teach a concept, I need to perform an actual test to get my point across to the students.  Testing or hacking a live site may have some […]
The post WebGoat 8: An intentionally Insecure Web Application for WebAp… Continue reading WebGoat 8: An intentionally Insecure Web Application for WebApp Testing