An Inside Look at a Week in the Life of a Social Engineer

An Inside Look at a Week in the Life of a Social Engineer

Recently, we sent 4 of our employees on an on-site social engineering engagement. We asked them to blog about their experience, tips and tricks, and lessons that they learned with our readers ...

Red Teaming: How to Run Effective Cyber-Drills?

What is red teaming? How is it different from conventional penetration testing? Why do we need blue, red, and white teams? How are cyber-drills carried out, and what results should be expected? ...
EH-Net - Osanda - WMI 101 for Pentesters

WMI 101 for Pentesters

PowerShell has gained popularity with SysAdmins and for good reason. It’s on every Windows machine (and now some Linux machines as well), has capabilities to interact with almost every service on every ...
The RastaLabs experience

The RastaLabs experience

IntroductionIt was 20 November, and I was just starting to wonder what I would do during the next month. I had already left my previous job, and the new one would only ...

Video: Burp-less Hacking – Learning Web Application Pentesting on a Budget

See FOSS Tools for WebApp Pentests! Video and Slide Deck from EH-Net Live! December 2019 Web Application Penetration Testing, or webapp pentesting, to put it simply is poking at the code behind ...

Webinar: Burp-less Hacking – Learning Web Application Pentesting on a Budget

Register Now to See a Full WebApp Pentest w/ FOSS! If there is one tool that a professional performing a web application penetration test or bug bounty hunting should buy, it’s Burp ...
EH-Net - Opinion - Heath Adams - Team Pentesting – The Unspoken Reality of Career Ethical Hacking

Team Pentesting – The Unspoken Reality of Career Ethical Hacking

As a professional penetration tester, there’s one thing that rarely if ever gets discussed. Is it that the common image of a hacker, the lone wolf pounding away on a keyboard in ...
EH-Net - Wyllie - Wireless Pentesting Part 2 - Building a WiFi Hacking Rig

Wireless Pentesting Part 2 – Building a WiFi Hacking Rig

In the first article of this series, “Wireless Pentesting Part 1 – An Overview”, we reviewed some penetration testing basics with the PTES and what one can expect to know about a ...

Webinar: All Things CTF!

Register Now to Find Fame, Fortune and Fun with CTFs! Capture the Flag is a game that can teach valuable lessons in teamwork, strategy, agility and endurance. The equivalent in the hacking ...
EH-Net - Wylie - Wireless Pentesting Part 1 – An Overview

Wireless Pentesting Part 1 – An Overview

As networks and computing systems have become more secure through the evolution of next generation firewalls, intrusion prevention systems (IPS), and endpoint security, attackers have shifted their focus. Web applications, mobile devices ...