Recommended Pentesting items

Check out our new Products page that includes hardware devices and various reference & training materials for carrying out White Hat Hacking & Pentesting.Continue readingRecommended Pentesting items

Synack

Synack is a Crowdsourced Security Platform who provide comprehensive penetration testing with actionable results.Continue readingSynack

System & Network Administration audiobooks

Below is a range of highly rated and popular audiobooks about System and Network Administration.Continue readingSystem & Network Administration audiobooks

USB Pentesting devices & attack tools (part 2)

Today we continue to check out some USB-based devices to help with Penetration Testing and Ethical Hacking of computers and networks.Continue readingUSB Pentesting devices & attack tools (part 2)

USB Pentesting devices & attack tools (part 1)

Today we take a look at some types of USB-based devices available to assist in Penetration Testing and Ethical Hacking of computers and networks.Continue readingUSB Pentesting devices & attack tools (part 1)

Cyber Security & Pentesting on YouTube

YouTube has limitations about tutorials on ‘how to hack’ or carry out anything illegal. With this in mind, how do you find video tutorials on legal activities such as Penetration Testing and other Cyber Security related topics? Here are some channels that you may find useful.Continue readingCyber Security & Pentesting on YouTube

Safety, Security & Privacy when surfing the Internet

Here are some video suggestions about how to stay safe & secure whilst maintaining personal privacy when surfing the internet.Continue readingSafety, Security & Privacy when surfing the Internet

Pentesting with VMware

How can VMware help with Penetration Testing and Ethical Hacking within the realm of Cyber Security?Continue readingPentesting with VMware

Network Scanning Tools (part 2)

In this second article we continue to look at Network Scanning / Mapping tools that are available for Pentesting and Ethical Hacking.Continue readingNetwork Scanning Tools (part 2)

Kali Linux for Pentesting

In this article we take a look at Kali Linux from Offensive Security. Kali is a Debian-based Linux Distribution containing several hundred tools geared towards Penetration Testing, Security research, Computer Forensics and Reverse Engineering.Continue readingKali Linux for Pentesting