You can register an iTabCode account to be able to view iTabCode without ads. ( Registration is Free ) Register Now

penetration testing

  1. x32x01

    A Beginner’s Guide to Buffer Overflow

    In this guide, we are going to learn about what is a buffer overflow and how it occurs? Buffer Overflow occurs by overwriting memory fragments of a process or program. Overwriting values of certain pointers and registers of the process causes segmentation faults which cause several errors...
  2. x32x01

    Anonymous Logins for Pentesters

    In this article, we will focus on the various services that support the Anonymous Logins. We will be understanding the process to setup those service on your local target system and then using Kali Linux to access them or attack them. Table of Content Introduction Setting up Anonymous FTP...
  3. x32x01

    Remote Desktop Penetration Testing (Port 3389)

    In this article, we are discussing Remote Desktop penetration testing in four scenarios. Through that, we are trying to explain how an attacker can breach security in a different- different scenario and what types of the major step should take by admin while activating RDP services to resist...
  4. x32x01

    VNC Penetration Testing

    In this article, we are discussing Internal Penetration Testing on the VNC server. Through that, we are trying to explain how an attacker can breach security in various scenarios with the installation and configuration, enumeration, and precautions as well. Table of Content Introduction...
  5. x32x01

    A Detailed Guide on Log4J Penetration Testing

    In this article, we are going to discuss and demonstrate in our lab setup, the exploitation of the new vulnerability identified as CVE-2021-44228 affecting the java logging package, Log4J. This vulnerability has a severity score of 10.0, most critical designation and offers remote code execution...
  6. x32x01

    [Penetration Testing] Top 70 Most Interview Questions

    As you prepare for your pentester interview, you may be considering which questions the employer is going to ask you. While there’s no way to know for sure what topics will be covered because information security is a huge field, there are several popular interview questions you can expect to be...
  7. x32x01

    Top 50 Hacking And Penetration Testing Tools [Compiled List 2021]

    From last few years, there will not be such a dividing line between security professionals and network engineers. Hacking tools are not the only thing necessary to successfully complete a PenTest, methodologies are also essential for ensuring that the assessor identifies all vulnerabilities...
  8. x32x01

    Cyber Security & Penetration Testing Multiple Choice Questions

    1. A process is nothing but a running instance of a program. True or False? a. True b. False 2. Which of the following Linux commands is used to check files opened by current user? a. crontab b. ls -l c. lsof d. dir 3. Which of the following files in Linux is used to store account passwords...
  9. x32x01

    OWASP Mantra - Browser for Penetration Testers

    During the penetration testing job we use lots of tools to make things easier. What if we have a browser have some extra functionality for us ? Yes we know that Firefox is a very good option and it is open-source too, Firefox already have lot's of plugins for doing some awesome things. But in...
  10. x32x01

    Easy Penetration Testing Lab Setup on Our Computer

    Practicing of an activity or skill is the best way to become pro in it. It is applicable on any field. This is also applicable for cybersecurity and bug bounty. But here we got a problem. We can not test our penetration testing skills anywhere, because attacking any system or website without...
  11. x32x01

    HTTP PUT Method Exploitation - Live Penetration Testing

    In this post, we’ll be exploiting the HTTP PUT method vulnerability on one of the Metasploitable2 webserver through which you can easily upload any malicious file onto the server and can gain the access of the whole webserver in meterpreter shell. In last article, we’ve already learnt that how...
  12. x32x01

    get into the penetration testing field

    Do you want to get into the penetration testing field?. if yes, we are going to discuss how you can stop being a script-kiddies and become a good penetration tester. If you are reading this post, you are on a good way to become an expert in penetration testing. The way has never been easy...
  13. x32x01

    The Hacker's Underground Handbook

    The Hacker's Underground Handbook Learn What it Takes to Crack Even the Most Secure Systems David Melnichuk, 2008 Pages: 116, PDF
  14. x32x01

    The Hacker Playbook - Practical Guide to Penetration Testing

    The Hacker Playbook - Practical Guide to Penetration Testing Peter Kim, 2014 Pages: 214, PDF
Top