How to install FileZilla FTP client in Ubuntu

A brief intro of FileZilla FileZilla is the open source FTP client program. It uses FTP/SFTP protocol to transfer the files. It allows us to securely transfer files from the local computer to the remote computer. It is mostly used by the web developers in the uploading, downloading and editing web pages. Webpages are stored … Read more

How to Install Visual Studio Code on Ubuntu

Visual Studio Code is an open-source cross-platform code editor developed by Microsoft. It has a built-in debugging support, embedded Git control, syntax highlighting, code completion, integrated terminal, code refactoring and snippets. The easiest and recommended way to install Visual Studio Code on Ubuntu machines is to enable the VS Code repository and install the VS … Read more

Where Do Attackers Have Most of Their Fun?

Hacking into a system and environment is almost always carried out by exploiting vulnerabilities in software. Only recently has the light started to shine on the root of the problem of successful attacks and exploits, which is flaws within software code. Most attack methods described in this book can be carried out because of errors … Read more

Structuring a Penetration Testing Agreement

When performing penetration tests, the signed agreements you have in place may be your best friend or worst enemy. The following documents apply. Statement of Work Most organizations use a Statement of Work (SOW) when contracting outside work. The format of the SOW is not as important as its content. Normally, the contractor (in this … Read more

Methodologies and Standards Penetration Test

There are several well-known penetration testing methodologies and standards. OWASP The Open Web Application Security Project (OWASP) has developed a widely used set of standards, resources, training material, and the famous OWASP Top 10 list, which provides the top ten web vulnerabilities and the methods to detect and prevent them. OSSTMM The Open Source Security … Read more

Organization of the Penetration Testing Team

The organization of the penetration testing team varies from job to job, but the following key positions should be filled (one person may fill more than one position): • Team leader • Physical security expert • Social engineering expert • Wireless security expert • Network security expert • Operating System expert

Locations of the Penetration Test

Determining the locations in scope is critical to establishing the amount of travel and the level of effort involved for physical security testing, wireless war driving, and social engineering attacks. In some situations, it will not be practical to evaluate all sites, but you need to target the key locations. For example, where are the … Read more

Scope of a Penetration Test

Scope is probably the most important issue when planning a penetration test. The test may vary greatly depending on whether the client wants all of their systems covered or only a portion of them. It is important to get a feel for the types of systems within scope to properly price out the effort. The … Read more

Planning a Penetration Test

Types of Penetration Tests There are basically three types of penetration testing: white box, black box, and gray box. White Box Testing White box testing is when the testing team has access to network diagrams, asset records, and other useful information. This method is used when time is of the essence and when budgets are … Read more