Jump to content

Search the Community

Showing results for tags 'pen testing'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 10 results

  1. I would like to know what are your thought on what distro to use for pen testing. Do you use Kali or build your own distro? I'm starting to learn so I use Kali
  2. Hi all, i'm undertaking a project to determine which vulnerability scanning tools within Kali Linux are best suited for the job, there were three tools tested and these were, Nikto, Sparta and OpenVAS. The results that these scans returned when scanning metasploitable 2 with a Kali linux machine are as follows: Metasploitable 2 Nikto 15 Sparta 46 OpenVAS 144 These results are solely the number of vulnerabilities that were returned, OpenVAS seems to be the right cho
  3. Hi all i'm currently undertaking a project that involves exploiting a metapsloitable 2 machine and a windows XP machine running SP3, however the findings that i have found are that there are limited resources available when using metapsloit as there seems to be many step by step guides of how to complete an exploit but not enough information regarding troubleshooting. Do you think it would be beneficial to learning to explain more about each step of an exploit in terms of what each command does and if an exploit fails for there to be more information available about why it fails and worka
  4. I am the system admin at my organization and my director has asked me to conduct some penetration testing. Partly because he wants to make sure we are secure, and partly because I want to do it. Not sure if this is the right place to ask this, but are there any legal concerns around me doing any testing of our network and systems? Some testing would occur with internal access to the network, and some would be external attacks. I know not really a technical question, and if this goes somewhere else let me know. Thanks!
  5. Hey i am new'ish to ctfs and have only done the a few on https://www.vulnhub.com , if anyone knows of a good one to do please leave a comment.
  6. Hey Y'all, First off thanks for taking the time to read this, and second I have always been interested in pen testing I am currently studying networking and was wondering if there are any good reads and or practice labs you wold recommend on setting up for a learning tool.
  7. Let's start by saying I am a N00b compared to many of you guys/gals. When my daughter got her Galaxy S3 stolen at school, I started asking myself "What If?" There has to be an easy way to find the MAC addresses of mobile devices around you. I Googled around for an hour or so and found this link http://www.l8ntwifi.com/ . It is a new device offered by a police officer to find stolen devices by MAC address. My first thought, of course, was Jasager should be able to do this easily. What do you guys/gals think? Is there an easier way? Also... Would Jasager stop an iPhone from randomizing the M
  8. Hi All, I was looking for some place to get to pen testing classes - I specifically want to get my CEH but I came across a place called infosec institute (link below) and they have a 10-day pen testings boot camp. They claim they train you up to 5 certs (I only see 4 listed - CEH, CPT, CEPT, and ECSA) that's still a lot regardless. The Test Vouchers are all included as well. That's a large promise, and I'm only able to find reviews from their own site. We all know that can be faked. Has anyone ever heard of them? Are they any good? I talked to one of the instructors and was told that since
  9. Hello hackers, coders and imagineers, I don't know if the Rubber Ducky is looking for an upgrade anytime soon, but if so I have a few ideas based on a recent project of mine, which uses the Teensy 3.1. Firstly, the one way nature of the device makes it difficult to acquire information from the host system. I see you have solved this by suggesting that a USB drive is used in parallel with the Rubber Ducky. Whilst this is a solution, it would be nice if the device could imitate a hub and provide the functionality of both the Rubber Ducky and a USB drive. Though, this will increase th
  10. I am interested in security, but am definitely a beginner in the field. My background is wireless networking. I was looking at purchasing a few books on the subject. Violent Python http://www.amazon.com/gp/product/1597499579/ref=ox_sc_act_title_2?ie=UTF8&psc=1&smid=ATVPDKIKX0DER Metasploit - David Kennedy http://www.amazon.com/gp/product/159327288X/ref=gno_cart_title_1?ie=UTF8&psc=1&smid=ATVPDKIKX0DER were recommended to me. Does anyone have any recommendations for a CEH book or any other good ones?
×
×
  • Create New...