Tutorial

Escape API Security Checklist
Are you looking to make your API security program stronger? Our detailed API Security Checklist is here to help ...

Application security audit: an in-depth guide
Discover our in-depth guide on application security audits, systematic evaluations conducted to assess the security posture of applications ...

Fiddling with Windows: Proxy tools for Win10
If you have been following along with us, you know how to set up a Windows 10 Virtual Machine (VM) for web app pentesting. But now we have run into another problem ...

WMI 101 for Pentesters
PowerShell has gained popularity with SysAdmins and for good reason. It’s on every Windows machine (and now some Linux machines as well), has capabilities to interact with almost every service on every ...
Pentesting with a Raspberry Pi!
For years now I have been a huge proponent of the Raspberry Pi. I started with a Raspberry Pi 2, which required a USB WiFi dongle for wireless, to a Raspberry Pi ...

Tshark: 7 Tips on Wireshark’s Command-Line Packet Capture Tool
If your current capture process can’t keep up with the traffic and drops packets – you need a new capture process. No debates here. Analyzing a trace file in which you don’t ...

Installing a Fake Internet with INetSim and PolarProxy
This is a tutorial on how to set up an environment for dynamic malware analysis, which can be used to analyze otherwise encrypted HTTPS and SMTPS traffic without allowing the malware to ...

Top 10 Uses of Wireshark for Hackers Part II
In a world... OK, just kidding. This isn't a movie trailer. However, the ever-increasing sophistication of attacks on our networks is no joking matter. To bypass firewalls, IDS/IPS, EPS, DLP and a ...

Top 10 Uses of Wireshark for Hackers Part I
Wireshark fits nicely in any toolbox of the network forensic analyst and ethical hacker. From hundreds of dissectors that decode the protocol and application fields, to the customization capability that enables you ...
DC-1 Vulnhub Walkthrough
DC-1 Vulnhub - Description DC-1 is a purposely built vulnerable lab for the purpose of gaining experience in the world of penetration testing. It was designed to be a challenge for beginners, ...