Sinisterly
Pentesting/Hacking scenario's - Methodology behind it all. - Printable Version

+- Sinisterly (https://sinister.ly)
+-- Forum: Hacking (https://sinister.ly/Forum-Hacking)
+--- Forum: Network Hacking (https://sinister.ly/Forum-Network-Hacking)
+--- Thread: Pentesting/Hacking scenario's - Methodology behind it all. (/Thread-Pentesting-Hacking-scenario-s-Methodology-behind-it-all)



Pentesting/Hacking scenario's - Methodology behind it all. - Null_Byte - 08-13-2014

Hey everybody, I'll be starting up a series of posts concerning network hacking/pentesting and the methods behind it. This Won't be a Post about skidding out with metasploit and using autopwn but more along the lines of thinking about the problem in a wider spectrum.

I'm currently writing up the first post of this series and I would like your feedback and maybe some suggestions.

Till then, have fun~


RE: Pentesting/Hacking scenario's - Methodology behind it all. - Adorapuff - 08-14-2014

So more of the theory behind pentesting in the real world opposed to say tuts on BoF?


RE: Pentesting/Hacking scenario's - Methodology behind it all. - Eclipse - 08-14-2014

I'm looking forward to it. The hacking forum is recently lacking HQ threads.


RE: Pentesting/Hacking scenario's - Methodology behind it all. - Null_Byte - 08-15-2014

(08-14-2014, 07:36 AM)Adorapuff Wrote: So more of the theory behind pentesting in the real world opposed to say tuts on BoF?

Yeah, I felt like this forum really needed something more in depth than just simple msf usage and the like. You can use msf but how will it benefit you in a real scenario?