/root
Wireless Pentesting Part 4 – Performing an Actual Wireless Pentest
In the previous article of this series, “Wireless Pentesting Part 3 – Common Wireless Attacks”, we discussed various scenarios to give you a better grasp of how wireless networks and clients can ...
Wireless Pentesting Part 3 – Common Wireless Attacks
In the previous article of this series, “Wireless Pentesting Part 2 – Building a WiFi Hacking Rig”, we discussed building a WiFi hacking rig. We covered the hardware, operating systems, and software ...
BBP: You’ve Just Been Promoted…
“So, I heard back from the team. They really liked you, but I had no idea that you’ve just been promoted. The policy is that if you’ve been promoted, you have to ...
Zoom for macOS Has a Couple of Dangerous Zero-Day Vulnerabilities
A couple of zero-day vulnerabilities found in the MacOS version of the Zoom video conferencing application could let attackers elevate their rights to root or to gain access to the microphone and ...
WMI 101 for Pentesters
PowerShell has gained popularity with SysAdmins and for good reason. It’s on every Windows machine (and now some Linux machines as well), has capabilities to interact with almost every service on every ...
BBP: My Path to the CISO Chair
Testing, testing. May I have your attention, please. *Ahem* Allow me to introduce myself and this new series of articles for The Ethical Hacker Network. My name is Stephanie, better known as ...
Wireless Pentesting Part 2 – Building a WiFi Hacking Rig
In the first article of this series, “Wireless Pentesting Part 1 – An Overview”, we reviewed some penetration testing basics with the PTES and what one can expect to know about a ...
Wireless Pentesting Part 1 – An Overview
As networks and computing systems have become more secure through the evolution of next generation firewalls, intrusion prevention systems (IPS), and endpoint security, attackers have shifted their focus. Web applications, mobile devices ...
Manual Vulnerability Detection
Typically during penetration tests, scanners are used to detect vulnerabilities. Sometimes security professionals may want to go undetected to test the response of the blue team (aka defensive security) and the security ...
Ease Me Into Cryptography Part 4: TLS – Applied Cryptographic Foundations
You made it to part 4! Here’s a quick overview of what we have broken down so far. We started with some basic vocabulary for cryptographic building blocks and talked about hash ...

