DEV Community

# pentesting

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The Books that Made me a Hacker

The Books that Made me a Hacker

23
Comments 2
9 min read
Useful online tools for OSINT

Useful online tools for OSINT

21
Comments
3 min read
Top 6 Ethical Hacking Tools

Top 6 Ethical Hacking Tools

17
Comments
3 min read
Pentesting Report: Attack Narrative Series Part 1: Recon

Pentesting Report: Attack Narrative Series Part 1: Recon

15
Comments
4 min read
Pentesting Report: Attack Narrative Series Part 2: Threat Modeling

Pentesting Report: Attack Narrative Series Part 2: Threat Modeling

12
Comments
2 min read
Web Pentesting Learning - Beginner edition

Web Pentesting Learning - Beginner edition

12
Comments
3 min read
Engaging in OverTheWire's Wargames

Engaging in OverTheWire's Wargames

12
Comments 1
3 min read
Nmap - Introduction (Part 1)

Nmap - Introduction (Part 1)

12
Comments
3 min read
Make a Rubber Ducky for $3 with Digispark

Make a Rubber Ducky for $3 with Digispark

9
Comments 9
3 min read
How to OSCP Labs Part 1: Getting Started

How to OSCP Labs Part 1: Getting Started

8
Comments 1
7 min read
Creepin' with Maltego

Creepin' with Maltego

8
Comments
3 min read
Android Pentesting: Writeup of DIVA Insecure Data Storage for Parrot OS

Android Pentesting: Writeup of DIVA Insecure Data Storage for Parrot OS

7
Comments
9 min read
XSS and SQLi Polyglot Payloads

XSS and SQLi Polyglot Payloads

7
Comments
3 min read
Android Pentesting: Writeup of the DIVA Insecure Logging and Hardcoding Issues for Parrot OS

Android Pentesting: Writeup of the DIVA Insecure Logging and Hardcoding Issues for Parrot OS

7
Comments
7 min read
Android Pentesting: Writeup of DIVA Input Validation Issues for Parrot OS

Android Pentesting: Writeup of DIVA Input Validation Issues for Parrot OS

6
Comments
6 min read
Generating pentest reports with Reconmap

Generating pentest reports with Reconmap

6
Comments
3 min read
Newbies and Documentation

Newbies and Documentation

5
Comments
2 min read
¿WhoUr? A Tool for information gathering, IPReverse, AdminFinder, DNS, WHOIS, SQLi Scanner with google.

¿WhoUr? A Tool for information gathering, IPReverse, AdminFinder, DNS, WHOIS, SQLi Scanner with google.

5
Comments
1 min read
Reconmap 1.1.0 release notes

Reconmap 1.1.0 release notes

5
Comments
2 min read
Polkit CVE-2021-3560

Polkit CVE-2021-3560

4
Comments
2 min read
Hacker Container for Kubernetes Security Assessments

Hacker Container for Kubernetes Security Assessments

4
Comments
3 min read
Using extensions for Bug Bounty and Pentesting

Using extensions for Bug Bounty and Pentesting

3
Comments 3
1 min read
Reconmap 1.5.0 release notes

Reconmap 1.5.0 release notes

3
Comments
2 min read
Pentesting Android Apps Using "Frida and Objection"

Pentesting Android Apps Using "Frida and Objection"

3
Comments 1
1 min read
A Practical Approach to Breaking & Pwning Kubernetes Clusters

A Practical Approach to Breaking & Pwning Kubernetes Clusters

3
Comments
5 min read
CTF Walkthrough: pentesting.cloud "Aurora Borealis"

CTF Walkthrough: pentesting.cloud "Aurora Borealis"

3
Comments
2 min read
API - What Is API, How to do API Security Testing

API - What Is API, How to do API Security Testing

3
Comments
2 min read
My Hacking Journey

My Hacking Journey

3
Comments 1
2 min read
Common Misconceptions About TryHackMe

Common Misconceptions About TryHackMe

2
Comments
2 min read
HackTheBox vs Real World Hacking

HackTheBox vs Real World Hacking

2
Comments
2 min read
Beta testers wanted!

Beta testers wanted!

2
Comments
1 min read
Data Breach: a 5 Steps Response Plan

Data Breach: a 5 Steps Response Plan

2
Comments
7 min read
Happy new year and release notes

Happy new year and release notes

1
Comments
2 min read
The most important step in hacking - Enumeration

The most important step in hacking - Enumeration

1
Comments
2 min read
Reconmap release notes (0.9.5)

Reconmap release notes (0.9.5)

1
Comments
2 min read
Why Is Penetration Testing Important For Your Website?

Why Is Penetration Testing Important For Your Website?

1
Comments 1
4 min read
How to OSCP Labs Part 2: Lab Time & Standards to Meet

How to OSCP Labs Part 2: Lab Time & Standards to Meet

1
Comments
7 min read
Una, guía ultra completa de la norma ISO 27001

Una, guía ultra completa de la norma ISO 27001

1
Comments
2 min read
Instalación de OpenVAS GVM en KALI Linux de forma correcta - ¡sin problemas de configuración!

Instalación de OpenVAS GVM en KALI Linux de forma correcta - ¡sin problemas de configuración!

1
Comments
1 min read
Should organizations consider purchasing paid tools for pentesting?

Should organizations consider purchasing paid tools for pentesting?

1
Comments
2 min read
Vulnerability Scanning

Vulnerability Scanning

1
Comments
2 min read
HackTheBox Writeups @ GuidedHacking

HackTheBox Writeups @ GuidedHacking

1
Comments
2 min read
Hacking Wi-Fi 1: Conociendo aircrack-ng y el modo monitor

Hacking Wi-Fi 1: Conociendo aircrack-ng y el modo monitor

1
Comments
2 min read
Getting Started with Penetration Testing

Getting Started with Penetration Testing

1
Comments
3 min read
Getting Started in Infosec

Getting Started in Infosec

1
Comments
3 min read
GH's Cybersecurity Tutorials

GH's Cybersecurity Tutorials

1
Comments
2 min read
Understanding Reconnaissance in Cybersecurity

Understanding Reconnaissance in Cybersecurity

1
Comments
3 min read
Hardening The Home Lab

Hardening The Home Lab

1
Comments
3 min read
Bash Bunny getting started

Bash Bunny getting started

1
Comments
1 min read
Password Exfiltration With Bash Bunny

Password Exfiltration With Bash Bunny

1
Comments 1
1 min read
Docker explained for pentesters

Docker explained for pentesters

Comments 1
7 min read
Ethical Hacking - Conceptos básicos

Ethical Hacking - Conceptos básicos

Comments
12 min read
Reconmap release notes (0.9.0)

Reconmap release notes (0.9.0)

Comments
2 min read
Top 5 Hacking Distros in 2023

Top 5 Hacking Distros in 2023

Comments
3 min read
AWS Pentesting: Flaws.cloud level 2

AWS Pentesting: Flaws.cloud level 2

Comments 1
3 min read
Mastering Nmap: Essential Commands and Examples for Network Security

Mastering Nmap: Essential Commands and Examples for Network Security

Comments
5 min read
Comprehensive PTaaS Pentesting offering from SkandaShield

Comprehensive PTaaS Pentesting offering from SkandaShield

Comments
5 min read
Reconmap release notes (0.8.5)

Reconmap release notes (0.8.5)

Comments
2 min read
HTB Academy | CROSS_SITE SCRIPTING (XSS) - Skills Assessment Walkthrough

HTB Academy | CROSS_SITE SCRIPTING (XSS) - Skills Assessment Walkthrough

Comments
2 min read
Hacking Wi-Fi 2: Introducción a airodump-ng y crackeos a WEP

Hacking Wi-Fi 2: Introducción a airodump-ng y crackeos a WEP

Comments
4 min read
loading...