EH-Net - Osanda - WMI 101 for Pentesters

WMI 101 for Pentesters

PowerShell has gained popularity with SysAdmins and for good reason. It’s on every Windows machine (and now some Linux machines as well), has capabilities to interact with almost every service on every ...
The RastaLabs experience

The RastaLabs experience

IntroductionIt was 20 November, and I was just starting to wonder what I would do during the next month. I had already left my previous job, and the new one would only ...

Video: Burp-less Hacking – Learning Web Application Pentesting on a Budget

See FOSS Tools for WebApp Pentests! Video and Slide Deck from EH-Net Live! December 2019 Web Application Penetration Testing, or webapp pentesting, to put it simply is poking at the code behind ...

Webinar: Burp-less Hacking – Learning Web Application Pentesting on a Budget

Register Now to See a Full WebApp Pentest w/ FOSS! If there is one tool that a professional performing a web application penetration test or bug bounty hunting should buy, it’s Burp ...
EH-Net - Opinion - Heath Adams - Team Pentesting – The Unspoken Reality of Career Ethical Hacking

Team Pentesting – The Unspoken Reality of Career Ethical Hacking

As a professional penetration tester, there’s one thing that rarely if ever gets discussed. Is it that the common image of a hacker, the lone wolf pounding away on a keyboard in ...
EH-Net - Wyllie - Wireless Pentesting Part 2 - Building a WiFi Hacking Rig

Wireless Pentesting Part 2 – Building a WiFi Hacking Rig

In the first article of this series, “Wireless Pentesting Part 1 – An Overview”, we reviewed some penetration testing basics with the PTES and what one can expect to know about a ...

Webinar: All Things CTF!

Register Now to Find Fame, Fortune and Fun with CTFs! Capture the Flag is a game that can teach valuable lessons in teamwork, strategy, agility and endurance. The equivalent in the hacking ...
EH-Net - Wylie - Wireless Pentesting Part 1 – An Overview

Wireless Pentesting Part 1 – An Overview

As networks and computing systems have become more secure through the evolution of next generation firewalls, intrusion prevention systems (IPS), and endpoint security, attackers have shifted their focus. Web applications, mobile devices ...
EH-Net - Wylie - Manual Vulnerability Detection

Manual Vulnerability Detection

Typically during penetration tests, scanners are used to detect vulnerabilities. Sometimes security professionals may want to go undetected to test the response of the blue team (aka defensive security) and the security ...

Video: Safe Harbor for Hackers

Join the Disclose.io Movement! Video and Slide Deck from EH-Net Live! April 2019 The Internet has an Auto-Immune Problem! It affects everyone on the planet, whether they’ve been the victim of a ...