Tagged articles
7 articles
Page 1 of 1
Practical DevOps Architecture
Practical DevOps Architecture
Mar 14, 2024 · Information Security

Comprehensive Penetration Testing Course Outline

This article provides a detailed curriculum for a penetration testing training program, covering operating system basics, web services, database setup, Kali Linux installation, various hacking tools, common web vulnerabilities, SQL injection techniques, command execution, file upload and inclusion flaws, XSS, CSRF, SSRF, privilege escalation, and internal network exploitation.

ethical hackinginformation securitynetwork security
0 likes · 10 min read
Comprehensive Penetration Testing Course Outline
Programmer DD
Programmer DD
Dec 12, 2022 · Information Security

When a Departing Engineer Locked Down a Company Server: Lessons in InfoSec

A former IT employee in Guangdong’s Nanhai district remotely encrypted his former employer’s server after resigning, causing a complete system shutdown and significant financial loss, prompting police to investigate the incident as a serious information‑security breach and sparking public debate about ethical use of technology.

data breachethical hackinginsider threat
0 likes · 5 min read
When a Departing Engineer Locked Down a Company Server: Lessons in InfoSec
MaGe Linux Operations
MaGe Linux Operations
Sep 20, 2022 · Information Security

Top 10 Essential Tools Every Ethical Hacker Must Use

Discover the ten most widely used security tools—from Nmap and Nessus to Metasploit—that ethical hackers rely on for network mapping, vulnerability scanning, wireless analysis, and automated exploitation, each with key features, platform support, and practical applications for strengthening defenses.

Metasploitethical hackingnessus
0 likes · 7 min read
Top 10 Essential Tools Every Ethical Hacker Must Use
Open Source Linux
Open Source Linux
May 11, 2022 · Information Security

Top 9 Essential Tools Every Ethical Hacker Should Master

This article introduces ethical hacking and presents nine widely used security tools—including Nmap, Nessus, Nikto, Kismet, NetStumbler, Acunetix, Netsparker, Intruder, and Metasploit—detailing their main features, platforms, and how they help professionals identify vulnerabilities and protect networks.

ethical hackingpenetration testingsecurity tools
0 likes · 7 min read
Top 9 Essential Tools Every Ethical Hacker Should Master
Open Source Linux
Open Source Linux
Aug 20, 2020 · Information Security

Top 10 Linux Distributions for Penetration Testing and Ethical Hacking

This article presents a curated list of the ten most popular Linux distributions used for penetration testing and ethical hacking, detailing each distro's base system, key features, toolsets, and where to download them, helping security professionals choose the right platform for their needs.

Linuxdistributionethical hacking
0 likes · 8 min read
Top 10 Linux Distributions for Penetration Testing and Ethical Hacking