Tags » Penetration Test

Penetration Testing

Also known as “pen testing” or “security testing” which is an attempts to exploit the vulnerabilities to determine whether unauthorized access or other malicious activity is possible. 145 more words


Penetration Test

SCADA Penatration Test – Cipher Security is a unique Information Security provider. Fast, flexible and with light footprint, Cipher Security is a Commando Elite unit

BlackArch revealed

You know Kali and you’re Arch fan? Now, you can try this: BlackArch!


Law Firms-Penetration Testing ?

“Penetration Testing has been around the Security Industry for over 50 years. Today on a Global Scale we are experiencing daily security breaches within the IT Infrastructure of all Organizations including Law Firms and the term… 195 more words

Book review: Software Security: Building Security in - Part II: Seven Touchpoints for Software Security

This is a review of the second part of the Software Security: Building Security in book.

Chapter 3: Introduction to Software Security Touchpoints

This is an introductory chapter for the second part of the book. 1,082 more words

IT Security

0x3 Legitimate but Illegal

Reference:  Spy Games – Legitimate but Illegal

Semua trafik komunikasi data yang keluar dari organisasi adalah legitimate. Namun, bisa jadi tidak semuanya legal. Karena ada kemungkinan, dimanfaatkan Malicious Actor yang melakukan pencurian data dengan menggunakan trafik yang legitimate tersebut untuk menipu. 984 more words

Penetration Test

0x2 The Enemy Within

References: The Enemy Within

Untuk menjelaskan topik tentang Data Exfiltration yang dibahas pada artikel sebelumnya ( 0x0 Data Exfiltration) serta melakukan simulasi berdasarkan skenario pada artikel… 1,291 more words

Penetration Test