Wireless Pentesting Part 4 – Performing an Actual Wireless Pentest

In the previous article of this series, “Wireless Pentesting Part 3 – Common Wireless Attacks”, we discussed various scenarios to give you a better grasp of how wireless networks and clients can be attacked. The real possibility of a compromise of you… Continue reading Wireless Pentesting Part 4 – Performing an Actual Wireless Pentest

Video: Android Hacking Proving Ground

Watch Now to Upgrade Your Android Hacking Skills!
Video and Slide Deck from EH-Net Live! Sept 2020
The world has gone mobile crazy. It seems as though no one can live without their smartphone, and Android dominates the scene with over 85% of the smartp… Continue reading Video: Android Hacking Proving Ground

How to configure Android (Virtual) for Mobile PenTest

This post is about setting up an Android Virtual Machine (AVD) for a mobile application penetration test.
The post How to configure Android (Virtual) for Mobile PenTest appeared first on Security Boulevard.
Continue reading How to configure Android (Virtual) for Mobile PenTest

Webinar: Android Hacking Proving Ground

Register Now to Upgrade Your Android Hacking Skills!
The world has gone mobile crazy. It seems as though no one can live without their smartphone, and Android dominates the scene with over 85% market share. With that kind of reach into the world popula… Continue reading Webinar: Android Hacking Proving Ground

Wireless Pentesting Part 3 – Common Wireless Attacks

In the previous article of this series, “Wireless Pentesting Part 2 – Building a WiFi Hacking Rig”, we discussed building a WiFi hacking rig. We covered the hardware, operating systems, and software requirements for setting up your own wireless pentest… Continue reading Wireless Pentesting Part 3 – Common Wireless Attacks

Video: Bad As You Want To Be – Adversary Emulation Basics

Watch Now to Amp Up Your Red Team!
Video and Slide Deck from EH-Net Live! May 2020
OK… so your infrastructure is pretty much locked down, your SOC is solid, you do regular pentests and even leveled up your organization’s capabilities to inc… Continue reading Video: Bad As You Want To Be – Adversary Emulation Basics

Webinar: Bad As You Want To Be – Adversary Emulation Basics

Register Now to Amp Up Your Red Team!
OK… so your infrastructure is pretty much locked down, your SOC is solid, you do regular pentests and even leveled up to include threat hunting, RE and malware analysis. Your security program is at a pretty m… Continue reading Webinar: Bad As You Want To Be – Adversary Emulation Basics

Pentesting Hack Chat this Wednesday

Join us on Wednesday, May 13 at noon Pacific for the Pentesting Hack Chat with Eric Escobar!

Ask anyone in this community to name their dream jobs and chances are pretty good that penetration tester will be somewhere on the shortlist. Pentesters are allowed — nay, encouraged — to break …read more

Continue reading Pentesting Hack Chat this Wednesday

Red Teaming: How to Run Effective Cyber-Drills?

What is red teaming? How is it different from conventional penetration testing? Why do we need blue, red, and white teams? How are cyber-drills carried out, and what results should be expected? In this article, we will answer these and other questions … Continue reading Red Teaming: How to Run Effective Cyber-Drills?

Lesser-Known Social Engineering Tricks

Penetration testers and chief information security officers (CISO) should find this article useful as it sheds light on a number of new social engineering hoaxes doing the rounds these days. These stratagems can be highly effective in targeted attack s… Continue reading Lesser-Known Social Engineering Tricks