1-800-917-5719
What exactly are the OWASP Top 10?

What exactly are the OWASP Top 10?

By: Eric Kobelski As a software developer turned security engineer, I continue to follow current development technologies, as it makes me more of an effective tester. One of the articles that I was reading contained an interview with one of the applications developers...
Red Teaming vs. Penetration Testing

Red Teaming vs. Penetration Testing

By: Randy Duprey What is Red Teaming? Red teaming in general can be defined as a goal-based adversarial testing process. The concept has existed since the sixth Century BCE when the ancient military genius Sun Tzu stated that “…one who knows the enemy and knows...
What exactly is a web application penetration test?

What exactly is a web application penetration test?

By: Eric Kobelski, Security Engineer One question that we get consistently is “What exactly is a web application penetration test?”. There are some companies that will run a vulnerability scanner against your application and call that a penetration test, but this is...
NullByte: 1 [Walkthrough]

NullByte: 1 [Walkthrough]

Originally Written By: Hunter Gregal Updated By: Justin Fimlaid It’s that time again; to practice our penetration testing skills and tactics! NullByte: 1 is another root-the-box type challenge that can be found on http://vulnhub.com. Like other challenges on the...

Securing Apache On Ubuntu/Debian

By: Hunter Gregal So you have an Apache2 webserver completely configured and installed on an Ubuntu/Debian machine. Perhaps you are using a MySQL backend along with PHP support (How To Install LAMP Server On Ubuntu ). But what happens when malicious attackers or bots...

Pin It on Pinterest