Pentesting Lab

Building a Pentesting Lab for Wireless Networks  eBooks & eLearning

Posted by ksveta6 at June 23, 2016
Building a Pentesting Lab for Wireless Networks

Building a Pentesting Lab for Wireless Networks by Vyacheslav Fadyushin, Andrey Popov
2016 | ISBN: 1785283154 | English | 264 pages | PDF (conv) | 7 MB

Pentester Academy - Web Application Pentesting & Javascript for Pentesters  eBooks & eLearning

Posted by house23 at Jan. 3, 2016
Pentester Academy - Web Application Pentesting & Javascript for Pentesters

Pentester Academy - Web Application Pentesting & Javascript for Pentesters
MP4 | AVC 1246kbps | English | 1280x1024 | 30fps | AAC stereo 242kbps | 6.23 GB
Genre: Video Training

In this course, we will be learning how to use Javascript for Pentesting.

Penetration Testing: A Survival Guide  eBooks & eLearning

Posted by AlenMiler at Jan. 21, 2017
Penetration Testing: A Survival Guide

Penetration Testing: A Survival Guide by Wolf Halton
English | 18 Jan. 2017 | ASIN: B01N35OHY0 | ISBN-13: 9781787287839 | 1045 Pages | AZW3/MOBI/EPUB/PDF (conv) | 243.18 MB

A complete pentesting guide facilitating smooth backtracking for working hackers

Pentester Academy - Pentesting iOS Applications [Repost]  eBooks & eLearning

Posted by IrGens at Aug. 22, 2016
Pentester Academy - Pentesting iOS Applications [Repost]

Pentester Academy - Pentesting iOS Applications
.MP4, AVC, 1200 kbps, 1280x1024 | English, AAC, 128 kbps, 2 Ch | 6.4 hours | 4.22 GB
Instructor: Vivek Ramachandran

Building Virtual Pentesting Labs for Advanced Penetration Testing (Repost)  eBooks & eLearning

Posted by bookwarrior at Aug. 5, 2016
Building Virtual Pentesting Labs for Advanced Penetration Testing (Repost)

Building Virtual Pentesting Labs for Advanced Penetration Testing By Kevin Cardwell
2014 | 430 Pages | ISBN: 1783284773 | EPUB + PDF | 71 MB

Mobile Device Exploitation Cookbook  eBooks & eLearning

Posted by Grev27 at July 22, 2016
Mobile Device Exploitation Cookbook

Prashant Verma, Akshay Dixit, "Mobile Device Exploitation Cookbook"
English | ISBN: 1783558725 | 2016 | PDF/EPUB/MOBI | 250 pages | 9 MB/14 MB/20 MB

Building Virtual Pentesting Labs for Advanced Penetration Testing (Repost)  eBooks & eLearning

Posted by tukotikko at July 10, 2016
Building Virtual Pentesting Labs for Advanced Penetration Testing (Repost)

Building Virtual Pentesting Labs for Advanced Penetration Testing By Kevin Cardwell
2014 | 430 Pages | ISBN: 1783284773 | EPUB + PDF | 71 MB

Building Virtual Pentesting Labs for Advanced Penetration Testing (Repost)  eBooks & eLearning

Posted by bookwyrm at June 26, 2016
Building Virtual Pentesting Labs for Advanced Penetration Testing (Repost)

Building Virtual Pentesting Labs for Advanced Penetration Testing By Kevin Cardwell
2014 | 430 Pages | ISBN: 1783284773 | EPUB + PDF | 71 MB

Pentester Academy - Pentesting Android Apps - DIVA  eBooks & eLearning

Posted by FenixN at June 20, 2016
Pentester Academy - Pentesting Android Apps - DIVA

Pentester Academy - Pentesting Android Apps - DIVA
HDRips | MP4/AVC, ~1343 kb/s | 3360x2100 | Duration: 00:58:47 | English: AAC, 250 kb/s (2 ch) | +Work Files | 637 MB
Genre: Development / Programming

DIVA is Damn Insecure and Vulnerable Application created by Aseem Jakhar, Payatu Labs. It contains various vulnerabilities including flaws in input validation, access control, hardcoding issues and a bunch more. This video course guides the viewer on how to analyse the vulnerabilities in DIVA and possibly exploit them. Using the skills learnt in the DIVA videos along with the Android for Pentesters training, you can apply the same knowledge to the real world application and identify security vulnerabilities in Android apps.
Create a complete and vulnerable Debian 8 server for hacking and pentesting (Make your own Free security virtual appliance)

Create a complete and vulnerable Debian 8 server for hacking and pentesting (Make your own Free security virtual appliance) by Marc ARNAERT
English | April 17, 2016 | ASIN: B01EGOZQK4 | 81 Pages | AZW3/MOBI/EPUB/PDF (conv) | 8.91 MB

In Cybersecurity, we generally use technical security weapon to probe and penetrate enemy. The best security distribution are the KALI LINUX, cause many people, white, grey, black hat have already integrated all best hacking tools into it.