HackMag

  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • Devops
  • HackMag

  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • Devops
  • Sign Up
  • Log In
  • Subscriptions
  • Log Out

Pentest in your own way. How to create a new testing methodology using OSCP and Hack The Box machines

Written by Evgeniy Gryaznov

Each aspiring pentester or information security enthusiast wants to advance at some point from reading exciting write-ups to practical tasks. How to do this in the best way and what should you pay attention to in the first place? In this article, I will describe my own pentesting journey and share some of my findings.
Read full article →

Protected by Qrator Labs
Recent Posts
  • Top 5 Ways to Use a VPN for Enhanced Online Privacy and Security
  • What Challenges To Overcome with the Help of Automated e2e Testing?
  • Playful Xamarin. Researching and hacking a C# mobile app
  • Challenge the Keemaker! How to bypass antiviruses and inject shellcode into KeePass memory
  • Vulnerable Java. Hacking Java bytecode encryption
Recent Comments
  • n01 on Spying penguin. Windows post-exploitation with a Linux-based VM
  • professional retard on Software for cracking software. Selecting tools for reverse engineering
  • Jim on Using Android to keep tabs on your girlfriend. With her consent, of course!
  • john on Homemade keylogger. Writing an undetectable keylogger in C#
  • Hosay on What data Windows 10 sends to Microsoft and how to stop it
What do you think about HackMag.com domain name?
  • Add your answer
  • Add your answer
×
You or your IP had already vote.
Recent Posts
  • Top 5 Ways to Use a VPN for Enhanced Online Privacy and Security
  • What Challenges To Overcome with the Help of Automated e2e Testing?
  • Playful Xamarin. Researching and hacking a C# mobile app
  • Challenge the Keemaker! How to bypass antiviruses and inject shellcode into KeePass memory
  • Vulnerable Java. Hacking Java bytecode encryption
Recent Comments
  • n01 on Spying penguin. Windows post-exploitation with a Linux-based VM
  • professional retard on Software for cracking software. Selecting tools for reverse engineering
  • Jim on Using Android to keep tabs on your girlfriend. With her consent, of course!
  • john on Homemade keylogger. Writing an undetectable keylogger in C#
  • Hosay on What data Windows 10 sends to Microsoft and how to stop it
  • Facebook

  • Twitter

  • Rss

HackMag.com © 2023

HackMag.com publishes high-quality translated content about information security, cyber security, hacking, malware and devops.