HackMag

  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • Devops
  • HackMag

  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • Devops
  • Sign Up
  • Log In
  • Subscriptions
  • Log Out

Conquering the web. Application instruction for OWASP Testing Guide v4

Written by v31_v37

Web security is a very broad term. It includes bugs in old protocols, usage of dangerous techniques, trivial human errors made by developers, and more. It is difficult to test products in such a broad area without a plan. The Open Web Application Security Project (OWASP) made the life of pentesters easier by producing the OWASP Testing Guide.

Read full article →


The weakest link. Phishing emails as a pentesting tool

Written by v31_v37

Conventional wisdom holds that the most vulnerable component of any computer system is its user. Humans may be inattentive, unthoughtful, or misinformed and easily become victims of phishing attacks. Accordingly, this weak link must be tested for security as thoroughly as the software and hardware components.

Read full article →


Protected by Qrator Labs
Recent Posts
  • Sad Guard. Identifying and exploiting vulnerability in AdGuard driver for Windows
  • Kung fu enumeration. Data collection in attacked systems
  • Serpent pyramid. Run malware from the EDR blind spots!
  • Attacks on the DHCP protocol: DHCP starvation, DHCP spoofing, and protection against these techniques
  • Poisonous spuds. Privilege escalation in AD with RemotePotato0
Recent Comments
  • GsFurtado on Step by Step. Automating multistep attacks in Burp Suite
  • Commander Crash on DDoS attacks on Bluetooth. How to disable annoying portable speakers
  • Hackcat on Homemade keylogger. Writing an undetectable keylogger in C#
  • Hackcat on Homemade keylogger. Writing an undetectable keylogger in C#
  • Hackcat on Homemade keylogger. Writing an undetectable keylogger in C#
What do you think about HackMag.com domain name?
  • Add your answer
  • Add your answer
×
You or your IP had already vote.
Recent Posts
  • Sad Guard. Identifying and exploiting vulnerability in AdGuard driver for Windows
  • Kung fu enumeration. Data collection in attacked systems
  • Serpent pyramid. Run malware from the EDR blind spots!
  • Attacks on the DHCP protocol: DHCP starvation, DHCP spoofing, and protection against these techniques
  • Poisonous spuds. Privilege escalation in AD with RemotePotato0
Recent Comments
  • GsFurtado on Step by Step. Automating multistep attacks in Burp Suite
  • Commander Crash on DDoS attacks on Bluetooth. How to disable annoying portable speakers
  • Hackcat on Homemade keylogger. Writing an undetectable keylogger in C#
  • Hackcat on Homemade keylogger. Writing an undetectable keylogger in C#
  • Hackcat on Homemade keylogger. Writing an undetectable keylogger in C#
  • Facebook

  • Twitter

  • Rss

HackMag.com © 2023

HackMag.com publishes high-quality translated content about information security, cyber security, hacking, malware and devops.