Login Register






The stories and information posted here are artistic works of fiction and falsehood. Only a fool would take anything posted here as fact.
Thread Rating:
  • 0 Vote(s) - 0 Average


Pentesting/Hacking scenario's - Methodology behind it all. filter_list
Author
Message
Pentesting/Hacking scenario's - Methodology behind it all. #1
Hey everybody, I'll be starting up a series of posts concerning network hacking/pentesting and the methods behind it. This Won't be a Post about skidding out with metasploit and using autopwn but more along the lines of thinking about the problem in a wider spectrum.

I'm currently writing up the first post of this series and I would like your feedback and maybe some suggestions.

Till then, have fun~

Reply





Messages In This Thread
Pentesting/Hacking scenario's - Methodology behind it all. - by Null_Byte - 08-13-2014, 09:06 AM



Users browsing this thread: 1 Guest(s)