In this How To we look at turning a smartphone or tablet into a dedicated and fully-featured mobile Pentesting platform. We start with downloading the Kali Linux NetHunter Lite ROM image and Rooting the Android device.Continue readingHow To install NetHunter Lite (part 1)
Tag: operating systems
Having upgraded a Nexus device to a later version of Android from a Linux computer, we find out if this helped improve support for Kali Linux NetHunter Rootless Edition.Continue readingHow To upgrade Android for NetHunter from Linux (part 2)
In this 2-part article we look at How To upgrade to a later version of Android on a Nexus device from a Linux computer. We then see if this helps improve support for Kali Linux NetHunter Rootless Edition.Continue readingHow To upgrade Android for NetHunter from Linux (part 1)
Can a smartphone or tablet be turned into a real mobile Pentesting platform? Here we look at installing Kali Linux NetHunter Rootless Edition on Nexus devices.Continue readingHow To install NetHunter Rootless Edition
Today we examine BackBox Linux which is toted to be fast, easy to use, and provides a minimal yet complete desktop environment. It contains the most popular and best known ethical hack tools.Continue readingBackBox Linux
Find the right Linux training course to help you become a better Pentester / Ethical Hacker or as a Sys Admin secure your company servers from attacks.Continue readingLinux training courses
In this article we take a look at the Virtual Machine hypervisor product VirtualBox, which is a useful tool for White Hat Hacking and Pentesting.Continue readingPenetration Testing with VirtualBox
Check out our new Products page that includes hardware devices and various reference & training materials for carrying out White Hat Hacking & Pentesting.Continue readingRecommended Pentesting items
Below is a range of highly rated and popular audiobooks about System and Network Administration.Continue readingSystem & Network Administration audiobooks
How can VMware help with Penetration Testing and Ethical Hacking within the realm of Cyber Security?Continue readingPentesting with VMware










