A Day In The Life Of A Pentester
Eddie Tan shares his typical day as a Penetration Tester at Horangi, including his day-to-day responsibilities, challenges he faces, as well as the skills he needs on the job.
Pentesting Tools & Resources To Get You Started
Entering the world of penetration testing can be a daunting task but we've put together a guide on how you can familiarize yourself with platforms, security tools, and other useful resources to help you get started.
4 Reasons Why Penetration Testing Is Important
Discover why penetration testing is essential for the health and security of your organization's systems and infrastructure, as we also reveal the massive financial damage in the wake of security incidents.
Between The Shades: Black, White & Gray-Box Penetration Testing
Black-box, gray-box, and white-box penetration testing are popular terms to describe the three primary types of penetration testing. How did they come about and what is the significance of each?
Does Pentesting Make Sense For Small Businesses?
No organization is too small to be targeted. All an attacker needs is one entry point to find a way into something bigger. So how can small businesses use a penetration test strategically to fit their limited budget?
Is Penetration Testing Sufficient For A Security Audit?
Pentesting may be one of the most popular practices in cybersecurity, but is it the same as a vulnerability assessment and is it comprehensive enough for your organization’s security workflow?
How Much Does A Penetration Test Cost?
Learn the various types and scales of pentesting that you can do, the quality of pentesters available in the market, and what you can expect to pay for a typical penetration test.
An Introduction To Pentesting Cloud Computing Environments
Technically, a penetration test on the cloud computing environment does not differ that much from any other penetration test, even an on-premise equivalent.
Android App Penetration Testing Made Easy
A quick penetration testing tutorial that provides a framework for security professionals to test the security of their Android applications.
Everything You Need To Know About Web Server Pentesting
A pentest doesn’t just reveal your vulnerabilities, but also the competence of your security or development team. We discuss the various exploitable target areas in a server.
Pentesting Methodology 101
Penetration testing is an authorized simulation of an attack on a system, network, or application to find potential vulnerabilities that can be exploited. Pentesting can be loosely placed into 3 categories, black, gray or white box testing.
AutoSploit: More harm or good for pentesting?
Tools enable a penetration tester to perform repetitive tasks faster in a more timely manner, achieving the objective in the quickest time without increasing the time spent or manpower to complete.