![]() |
Pentesting/Hacking scenario's - Methodology behind it all. - Printable Version +- Sinisterly (https://sinister.ly) +-- Forum: Hacking (https://sinister.ly/Forum-Hacking) +--- Forum: Network Hacking (https://sinister.ly/Forum-Network-Hacking) +--- Thread: Pentesting/Hacking scenario's - Methodology behind it all. (/Thread-Pentesting-Hacking-scenario-s-Methodology-behind-it-all) |
Pentesting/Hacking scenario's - Methodology behind it all. - Null_Byte - 08-13-2014 Hey everybody, I'll be starting up a series of posts concerning network hacking/pentesting and the methods behind it. This Won't be a Post about skidding out with metasploit and using autopwn but more along the lines of thinking about the problem in a wider spectrum. I'm currently writing up the first post of this series and I would like your feedback and maybe some suggestions. Till then, have fun~ RE: Pentesting/Hacking scenario's - Methodology behind it all. - Adorapuff - 08-14-2014 So more of the theory behind pentesting in the real world opposed to say tuts on BoF? RE: Pentesting/Hacking scenario's - Methodology behind it all. - Eclipse - 08-14-2014 I'm looking forward to it. The hacking forum is recently lacking HQ threads. RE: Pentesting/Hacking scenario's - Methodology behind it all. - Null_Byte - 08-15-2014 (08-14-2014, 07:36 AM)Adorapuff Wrote: So more of the theory behind pentesting in the real world opposed to say tuts on BoF? Yeah, I felt like this forum really needed something more in depth than just simple msf usage and the like. You can use msf but how will it benefit you in a real scenario? |