Quantcast
Channel: Penetration Testing – Security Generation
Browsing all 7 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Clever Full-Site Tracking with XSS-Track

Cross-site Scripting (or XSS) is a common web application vulnerability with varying levels of severity. Generally the capabilities of a XSS are limited to the locations of vulnerable inputs and...

View Article



Image may be NSFW.
Clik here to view.

Pic of the Week: Real-World Penetration Testing

Can’t remember where I found this image, but it’s an amusing hyperbole of the sometimes limited or frustrating nature of penetration testing. Anyone who’s done pen testing/ethical hacking as a job will...

View Article

Image may be NSFW.
Clik here to view.

BackTrack 5 “Revolution” in Development (Screenshots)

Click to enlarge BackTrack 5 – codenamed “Revolution” – is currently under development, and the team is working on updating both system and tools. At the moment it’s running a 2.6.38-rc5 kernel,...

View Article

Image may be NSFW.
Clik here to view.

BackTrack 5 “Revolution” Released

The most popular security and penetration testing Linux distribution has been updated once again, this time built from scratch! BackTrack 5, codenamed “Revolution”, is based on Ubuntu Lucid LTS with...

View Article

Image may be NSFW.
Clik here to view.

Reverse SSH over Tor on the Pwnie Express

The Pwnie Express (PwnPlug) is a great little tool for hackers, pentesters and social engineers alike. While I don’t advocate the use of a Pwnie for illicit purposes, I was intrigued about using it as...

View Article


Image may be NSFW.
Clik here to view.

Hi, I’m a Pen(etration) Tester!

The first thing people think when you tell them you’re a Penetration Tester:                   What people think when you tell them you’re a Pen Tester:                     Protip: Go with the first...

View Article

Curated List of Penetration Testing Reports

Julio Cesar Fort has started putting together a curated list of penetration testing reports from a variety of security consultancies. While the list is new, and not exhaustive yet, it’s on the right...

View Article
Browsing all 7 articles
Browse latest View live




Latest Images