EH-Net - Wylie - Wireless Pentesting Part 4 – Performing an Actual Wireless Pentest

Wireless Pentesting Part 4 – Performing an Actual Wireless Pentest

In the previous article of this series, “Wireless Pentesting Part 3 – Common Wireless Attacks”, we discussed various scenarios to give you a better grasp of how wireless networks and clients can ...

Video: Android Hacking Proving Ground

Watch Now to Upgrade Your Android Hacking Skills! Video and Slide Deck from EH-Net Live! Sept 2020 The world has gone mobile crazy. It seems as though no one can live without ...
Android Virtual Device for a Mobile PenTest

How to configure Android (Virtual) for Mobile PenTest

This post is about setting up an Android Virtual Machine (AVD) for a mobile application penetration test ...
EH-Net Live! - Sept 2020 - Android Hacking Proving Ground - Register Now

Webinar: Android Hacking Proving Ground

Register Now to Upgrade Your Android Hacking Skills! The world has gone mobile crazy. It seems as though no one can live without their smartphone, and Android dominates the scene with over ...
EH-Net - Wylie - Wireless Pentesting Part 3 - Common Wireless Attacks

Wireless Pentesting Part 3 – Common Wireless Attacks

In the previous article of this series, “Wireless Pentesting Part 2 – Building a WiFi Hacking Rig”, we discussed building a WiFi hacking rig. We covered the hardware, operating systems, and software ...

Video: Bad As You Want To Be – Adversary Emulation Basics

Watch Now to Amp Up Your Red Team! Video and Slide Deck from EH-Net Live! May 2020 OK… so your infrastructure is pretty much locked down, your SOC is solid, you do ...

Webinar: Bad As You Want To Be – Adversary Emulation Basics

Register Now to Amp Up Your Red Team! OK… so your infrastructure is pretty much locked down, your SOC is solid, you do regular pentests and even leveled up to include threat ...
An Inside Look at a Week in the Life of a Social Engineer

An Inside Look at a Week in the Life of a Social Engineer

Recently, we sent 4 of our employees on an on-site social engineering engagement. We asked them to blog about their experience, tips and tricks, and lessons that they learned with our readers ...

Red Teaming: How to Run Effective Cyber-Drills?

What is red teaming? How is it different from conventional penetration testing? Why do we need blue, red, and white teams? How are cyber-drills carried out, and what results should be expected? ...
EH-Net - Osanda - WMI 101 for Pentesters

WMI 101 for Pentesters

PowerShell has gained popularity with SysAdmins and for good reason. It’s on every Windows machine (and now some Linux machines as well), has capabilities to interact with almost every service on every ...