HackMag

  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • Devops
  • HackMag

  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • Devops
  • Sign Up
  • Log In
  • Subscriptions
  • Log Out

Conquering the web. Application instruction for OWASP Testing Guide v4

Written by v31_v37

Web security is a very broad term. It includes bugs in old protocols, usage of dangerous techniques, trivial human errors made by developers, and more. It is difficult to test products in such a broad area without a plan. The Open Web Application Security Project (OWASP) made the life of pentesters easier by producing the OWASP Testing Guide.

Read full article →


The weakest link. Phishing emails as a pentesting tool

Written by v31_v37

Conventional wisdom holds that the most vulnerable component of any computer system is its user. Humans may be inattentive, unthoughtful, or misinformed and easily become victims of phishing attacks. Accordingly, this weak link must be tested for security as thoroughly as the software and hardware components.

Read full article →


Protected by Qrator Labs
Recent Posts
  • Seizing subdomains. How I took over Microsoft subdomains and how to perform such attacks
  • Stratosphere flight. How to crack Struts using an Action app and create a Forward Shell
  • The PWN realm. Modern techniques for stack overflow exploitation
  • Python reverse shell. How to boost your networking capacity with Python scripts
  • Hack in one click. Comparing automated vulnerability scanners
Recent Comments
  • professional retard on Software for cracking software. Selecting tools for reverse engineering
  • Jim on Using Android to keep tabs on your girlfriend. With her consent, of course!
  • john on Homemade keylogger. Writing an undetectable keylogger in C#
  • Hosay on What data Windows 10 sends to Microsoft and how to stop it
  • EleenaGates on Wi-Fi total PWN. Mastering actual Wi-Fi pentesting techniques from scratch
  • Facebook

  • Twitter

  • Rss

HackMag.com © 2021

HackMag.com publishes high-quality translated content about information security, cyber security, hacking, malware and devops.