Video: Burp-less Hacking – Learning Web Application Pentesting on a Budget

See FOSS Tools for WebApp Pentests!
Video and Slide Deck from EH-Net Live! December 2019
Web Application Penetration Testing, or webapp pentesting, to put it simply is poking at the code behind a web site to see if there are any holes. If there are, ho… Continue reading Video: Burp-less Hacking – Learning Web Application Pentesting on a Budget

Webinar: Burp-less Hacking – Learning Web Application Pentesting on a Budget

Register Now to See a Full WebApp Pentest w/ FOSS!
If there is one tool that a professional performing a web application penetration test or bug bounty hunting should buy, it’s Burp Suite Pro. But what if you’re just starting and have no bu… Continue reading Webinar: Burp-less Hacking – Learning Web Application Pentesting on a Budget

Team Pentesting – The Unspoken Reality of Career Ethical Hacking

As a professional penetration tester, there’s one thing that rarely if ever gets discussed. Is it that the common image of a hacker, the lone wolf pounding away on a keyboard in a dark room only taking breaks for caffeine and cold pizza and, of … Continue reading Team Pentesting – The Unspoken Reality of Career Ethical Hacking

Wireless Pentesting Part 2 – Building a WiFi Hacking Rig

In the first article of this series, “Wireless Pentesting Part 1 – An Overview”, we reviewed some penetration testing basics with the PTES and what one can expect to know about a system before starting an engagement. We also covered t… Continue reading Wireless Pentesting Part 2 – Building a WiFi Hacking Rig

Reliance acsn enhances its service by adding Highlight’s network and app monitoring and reporting

London-based global cyber security specialist Reliance acsn is enhancing its services with the addition of Highlight’s network and application monitoring and reporting. Reliance acsn protects its customers’ information assets through the creation of ri… Continue reading Reliance acsn enhances its service by adding Highlight’s network and app monitoring and reporting

Wireless Pentesting Part 1 – An Overview

As networks and computing systems have become more secure through the evolution of next generation firewalls, intrusion prevention systems (IPS), and endpoint security, attackers have shifted their focus. Web applications, mobile devices and apps, IoT … Continue reading Wireless Pentesting Part 1 – An Overview