Penetration Test Reporting – Some thoughts

Hello everyone, it's been a while since my last post (sometimes you get stuck in the corporate loop). As you must have guessed from the title, today we're going to get a little non-technical and talk about what constitutes a good penetration testing report and how you can improve writing one. This topic is helpful … Continue reading Penetration Test Reporting – Some thoughts

Breaking Down Nmap – Part 3

Welcome to the third & final installation of the series Breaking Down Nmap. In this post, we're going to talk about basics of Timing & Performance as well as Firewall / IDS Evasion. Note: Some of the options are going to be left unexplained, take this opportunity to experiment with it 😀 --data, --data-string, --data-length, --proxies, --ip-options, … Continue reading Breaking Down Nmap – Part 3

Breaking Down Nmap – Part 1

Introduction Network Mapper or Nmap for short, is a network reconnaissance tool developed by Fyodor in the late 90s, and it is till date, one of the most preferred and popular network mapper today. It is actively maintained & developed and started shipping with a GUI based scanner some time ago. Scanning with Nmap We'll cover Nmap … Continue reading Breaking Down Nmap – Part 1

Road to OSCP – Part 1

Doesn't matter if you're just getting into cyber security or you have already been here a while, you must've heard about offensive-security and their well known Offensive Security Certified Professional or OSCP for short. root@acc3ssp0int:~# cat OSCPguide/newb.txt I've never written a blog before, this is an attempt at one. This post is going to be … Continue reading Road to OSCP – Part 1