Search
TOOLS DON'T MAKE HACKERS, HACKERS MAKE TOOLS. An info sec junkie's professional path. Professional pentester and Red Teamer since October 2018. I love hacking and coding and I hope I can give my little knowledge back to the community and help make information systems more secure. This blog focuses on information security and white hat hacking, i.e. hacking based on the client's authorization. Hacking must be done responsibly: don't ruin people's lives and businesses.
Posts
Showing posts from November, 2017
Contact Form
Tips for an Information Security Analyst/Pentester career - Ep. 42: Client-side attacks (pt. 3)
- Get link
- X
- Other Apps
Tips for an Information Security Analyst/Pentester career - Ep. 41: Client-side attacks (pt. 2)
- Get link
- X
- Other Apps
Tips for an Information Security Analyst/Pentester career - Ep. 40: Client-side attacks (pt. 1)
- Get link
- X
- Other Apps
Tips for an Information Security Analyst/Pentester career - Ep. 39: NFS shares
- Get link
- X
- Other Apps
Tips for an Information Security Analyst/Pentester career - Ep. 38: DNS Spoofing
- Get link
- X
- Other Apps
Tips for an Information Security Analyst/Pentester career - Ep. 37: ARP Spoofing
- Get link
- X
- Other Apps
Tips for an Information Security Analyst/Pentester career - Ep. 36: Nikto, PHPMyAdmin and WebDav
- Get link
- X
- Other Apps
Tips for an Information Security Analyst/Pentester career - An overview of the series
- Get link
- X
- Other Apps
Tips for an Information Security Analyst/Pentester career - Ep. 35 - Metasploit: auxiliary and check
- Get link
- X
- Other Apps
Tips for an Information Security Analyst/Pentester career - Ep. 34 - Metasploit: exploit options and msfvenom
- Get link
- X
- Other Apps