Pentesting/Hacking scenario's - Methodology behind it all. 08-13-2014, 09:06 AM
#1
Hey everybody, I'll be starting up a series of posts concerning network hacking/pentesting and the methods behind it. This Won't be a Post about skidding out with metasploit and using autopwn but more along the lines of thinking about the problem in a wider spectrum.
I'm currently writing up the first post of this series and I would like your feedback and maybe some suggestions.
Till then, have fun~
I'm currently writing up the first post of this series and I would like your feedback and maybe some suggestions.
Till then, have fun~