Tags • Page 2/2Penetration testing examplesCheck out these hands-on pentesting examples to understand the risks of high-risk CVEs and how to better detect them. How to detect injection flaws with Pentest-Tools.comWhether you’re a penetration tester, bug bounty hunter, or security pro, you’re probably familiar with all the OWASP Top 10 vulnerabilities affecting web applications.Author(s)Cristian CorneaPublished at19 Mar 2021Updated at29 Apr 2024How to simulate phishing attacks with the HTTP Request LoggerAs a penetration tester or a Red Team security consultant, you probably deal with lots of challenges when you want to simulate phishing attacks using social engineering techniques. Because our team’s goal is to make your job easier by providing the right tools, we’ve put together a hands-on guide you can use straight away!Author(s)Razvan IonescuPublished at20 Feb 2020Updated at29 Apr 2024How to detect the SACK Panic vulnerability with WiresharkThe security team at Pentest-Tools.com has recently performed an in-depth analysis of the SACK Panic vulnerability (which was first disclosed in June 2019) to find out its exploitability against Linux machines. Throughout this research, we’ve identified a new method to detect vulnerable servers using Wireshark, the popular network traffic analyzer.Author(s)Stefan BratescuPublished at09 Jan 2020Updated at22 Jun 2023How to Perform Internal Network Scanning with Pentest-Tools.comIn this article, we show you how to scan hosts from your internal network using our security tools from Pentest-Tools.com. This is a new capability that we have recently added to our platform and it uses VPN tunnels to reach the internal networks.Author(s)Cosmin TudorPublished at28 Sep 2019Updated at10 Jun 2024How to exploit the BlueKeep vulnerability with MetasploitIn this article, we show our approach for exploiting the RDP BlueKeep vulnerability using the recently proposed Metasploit module.Author(s)Razvan Ionescu,Stefan Bratescu,Cristin SirbuPublished at10 Sep 2019Updated at01 Apr 2024Essential HTTP Headers for securing your web serverIn this article, we discuss the most important HTTP headers that you should configure on your web server in order to improve its security.Author(s)Satyam SinghPublished at22 Oct 2018Updated at29 Apr 202412
How to detect injection flaws with Pentest-Tools.comWhether you’re a penetration tester, bug bounty hunter, or security pro, you’re probably familiar with all the OWASP Top 10 vulnerabilities affecting web applications.Author(s)Cristian CorneaPublished at19 Mar 2021Updated at29 Apr 2024
How to simulate phishing attacks with the HTTP Request LoggerAs a penetration tester or a Red Team security consultant, you probably deal with lots of challenges when you want to simulate phishing attacks using social engineering techniques. Because our team’s goal is to make your job easier by providing the right tools, we’ve put together a hands-on guide you can use straight away!Author(s)Razvan IonescuPublished at20 Feb 2020Updated at29 Apr 2024
How to detect the SACK Panic vulnerability with WiresharkThe security team at Pentest-Tools.com has recently performed an in-depth analysis of the SACK Panic vulnerability (which was first disclosed in June 2019) to find out its exploitability against Linux machines. Throughout this research, we’ve identified a new method to detect vulnerable servers using Wireshark, the popular network traffic analyzer.Author(s)Stefan BratescuPublished at09 Jan 2020Updated at22 Jun 2023
How to Perform Internal Network Scanning with Pentest-Tools.comIn this article, we show you how to scan hosts from your internal network using our security tools from Pentest-Tools.com. This is a new capability that we have recently added to our platform and it uses VPN tunnels to reach the internal networks.Author(s)Cosmin TudorPublished at28 Sep 2019Updated at10 Jun 2024
How to exploit the BlueKeep vulnerability with MetasploitIn this article, we show our approach for exploiting the RDP BlueKeep vulnerability using the recently proposed Metasploit module.Author(s)Razvan Ionescu,Stefan Bratescu,Cristin SirbuPublished at10 Sep 2019Updated at01 Apr 2024
Essential HTTP Headers for securing your web serverIn this article, we discuss the most important HTTP headers that you should configure on your web server in order to improve its security.Author(s)Satyam SinghPublished at22 Oct 2018Updated at29 Apr 2024