Login Register






The stories and information posted here are artistic works of fiction and falsehood. Only a fool would take anything posted here as fact.
Thread Rating:
  • 0 Vote(s) - 0 Average


Pentesting/Hacking scenario's - Methodology behind it all. filter_list
Author
Message
Pentesting/Hacking scenario's - Methodology behind it all. #1
Hey everybody, I'll be starting up a series of posts concerning network hacking/pentesting and the methods behind it. This Won't be a Post about skidding out with metasploit and using autopwn but more along the lines of thinking about the problem in a wider spectrum.

I'm currently writing up the first post of this series and I would like your feedback and maybe some suggestions.

Till then, have fun~

Reply

RE: Pentesting/Hacking scenario's - Methodology behind it all. #2
So more of the theory behind pentesting in the real world opposed to say tuts on BoF?
#MakeSinisterlySexyAgain

Reply

RE: Pentesting/Hacking scenario's - Methodology behind it all. #3
I'm looking forward to it. The hacking forum is recently lacking HQ threads.

Reply

RE: Pentesting/Hacking scenario's - Methodology behind it all. #4
(08-14-2014, 07:36 AM)Adorapuff Wrote: So more of the theory behind pentesting in the real world opposed to say tuts on BoF?

Yeah, I felt like this forum really needed something more in depth than just simple msf usage and the like. You can use msf but how will it benefit you in a real scenario?

Reply







Users browsing this thread: 2 Guest(s)