Browsing the "pen testing" Tag

Hack The Box – Hacking Optimum

April 3rd, 2020 📆 | 7234 Views ⚑

For those who are starting in the cyber security area, the Hack The Box is an online platform that allows

Tagged with:

Pen Testing ICS and Other Highly Restricted Environments – SANS Pen Test HackFest Summit 2019

March 31st, 2020 📆 | 5123 Views ⚑

View upcoming Summits: Presenter: Don C. Weber (@cutaway), Principal Consultant, Founder, Cutaway Security, LLC, Instructor, SANS Institute “Congratulations, you

Tagged with:

Penetration Testing Demo: Brute Force Dictionary Attack Using Hydra and RSMangler

March 14th, 2020 📆 | 4011 Views ⚑

In this video we will demonstrate how to use Hydra and RSMangler to launch a brute force attack on a

Tagged with:

How to Build an Active Directory Hacking Lab

December 27th, 2019 📆 | 7486 Views ⚑

Sponsor Info: VictSing official website: Product link: 20% Discount Code: YPWY22VP TCM Udemy Course: 90% Discount Code

Tagged with:

PTS and eJPT Review – eLearnSecurity

December 16th, 2019 📆 | 1537 Views ⚑

A quick review of eLearnSecurity’s Penetration Testing Student and Junior Penetration Tester certification! Check out for more stuff on

Tagged with:

Domain Admin via IPv6 DNS Takeover

December 10th, 2019 📆 | 7913 Views ⚑

In this video, we explore obtaining domain admin via IPv6 takeover with mitm6 Blogs: mitm6 – compromising IPv4 networks

Tagged with:

Burp Suite Pro Walkthrough

November 26th, 2019 📆 | 8442 Views ⚑

In this walkthrough video, we cover Burp Suite Pro and some of its amazing features. ❓Info❓ ___ Hire me:

Tagged with:

Metasploitable #3 – Gaining Root Access on a Vulnerable System (SAMBA Exploit)

November 8th, 2019 📆 | 8270 Views ⚑

In computer networking, Server Message Block (SMB), one version of which was also known as Common Internet File System (CIFS

Tagged with:

Web App Testing: Episode 1 – Enumeration

August 15th, 2019 📆 | 2084 Views ⚑

0:00 – Introductions/Welcomes 5:47 – whoami 7:25 – Course learning objectives 11:30 – Important TCM resources 14:03 – Web app

Tagged with:

Weaponizing Active Directory

August 1st, 2019 📆 | 6453 Views ⚑

Download slides: 0:54 Background behind this webcast, what and why 7:02 Creating resources in Active Directory, User accounts, Groups,

Tagged with:

Interview with The Blind Hacker

June 22nd, 2019 📆 | 6776 Views ⚑

In this video I interview ActiveCyber’s Director of Offensive Security & Elite Ethical Hacker Joe Brinkley, more commonly known as

Tagged with:

Medusa Brute Force Password Cracking Tool

April 22nd, 2019 📆 | 3180 Views ⚑

Medusa is intended to be a speedy, massively parallel, modular, login brute-forcer. The goal is to support as many services

Tagged with:


January 26th, 2019 📆 | 4693 Views ⚑

Week TWENTY THREE of OSCP!! Confidence increased, Root time decreased! I’m definitely getting better at this! Visit my blog at

Tagged with: