"How do I become an ethical hacker?" I hold myself to high standards. I likely won't consider myself a real ethical hacker until a) I'm either paid to be one, or b) I can confidently say I'm at the expert level. Despite how open I am about my own abilities, and despite how many times ...
PenTest Edition: SQL Injection Attacks Using Both Burp Suite and Sqlmap
In this tutorial, I'm using BurpSuite to grab cookie information from a user and feed it into an SQL injection attack using sqlmap. To perform this attack, I'm using the Damn Vulnerable Web App (DVWA) as a SQL injection vulnerable web site/database. As a prerequisite, the reader should have at least a basic understanding of ...
PenTest Edition: Go from Beginner to Advanced with nmap
Network Mapper, otherwise known as "nmap," is a powerful open-source program, perfect for conducting reconnaissance and enumeration. Yes, nmap is well-known for this purpose and it's included in every whitehat-to-blackhat's toolbox for that very reason; however, I want to point out that it has many other uses as well. For instance, a network administrator could ...
The Sony Pictures Entertainment Hack: A Look at the Evidence We Have
Note: Much of this information comes from an official affidavit, The United States of America vs. Park Jin Hyok, also known as ("aka") "Jin Hyok Park," aka "Pak Jin Hek," (United States District Court for the Central District of Caliornia June 8, 2018). If you want to review the entire 179-page document, it's available at https://www.justice.gov/opa/press-release/file/1092091/download. The ...
Installing Kali Linux in VMware Workstation Player (VMware Tools Included)
This tutorial will walk you through installing the latest version of Kali Linux as a Virtual Machine (VM) on VMware Workstation Player 14. I will also show you how to install VMware tools. Straight from the official Kali Linux Web site: Kali Linux is a Debian-based Linux distribution aimed at advanced Penetration Testing and Security ...