0xiNPro0xshin.hashnode.dev·Apr 6, 2024Fuzzing series - Vhost Fuzzing and filtering with Ffuf - 03Vhost fuzzing is a crucial technique for identifying both public and non-public sub-domains and virtual hosts (VHosts) that are served from the same server but do not have public DNS records. This document is structured to ensure clarity and thorough...DiscussCPTS Journeyfluf
Pratik MaliforThe Tech Deckthetechdeck.hashnode.dev·Nov 27, 2023How to Install Kali Linux on VMware Step-by-StepKali Linux is one of the most popular Linux distributions used for penetration testing and ethical hacking. It comes preloaded with hundreds of tools used to test network security. Installing Kali Linux on VMware Workstation allows you to run Kali in...Discuss·255 readsLinuxKali Linux
Fawaz KhosaifanforCD !ROOT Blogscdunroot.hashnode.dev·Sep 18, 2023ExploitationOverview The exploitation phase is the phase where the tester tries to gain access to the system using the vulnerabilities identified in the previous phase. The exploitation phase is important because: It helps to determine the severity of the vulne...DiscussPenetration Testing PhasesExploitation
Fawaz KhosaifanforCD !ROOT Blogscdunroot.hashnode.dev·Sep 18, 2023Vulnerability ScanningOverview Vulnerability scanning is a critical phase in the penetration testing process, where the primary goal is to identify potential vulnerabilities and weaknesses in the target system or application. The purpose of this phase is to determine the ...Discussvulnerability scanning
Matthew Hardmatthewhard.com·Apr 26, 202310 Important Pentesting Tools for Your Tool BagAs a pentester, having the right tools is key to getting the job done right. Whether you're testing the security of a web application or a wireless network, these 10 tools are a must-have in your tool bag. Nmap: This tool is like a Swiss Army knife ...Discuss·27 readspentesting