• HOME
  • ABOUT
  • CONTACT
  • DISCLAIMER
  • PRIVACY POLICY
Hacktress
  • HOME
  • ABOUT
  • CONTACT
  • DISCLAIMER
  • PRIVACY POLICY

Category: Hacking

/Hacking /

The interviewer leaves you alone in a room with a computer. Your job is to hack their test network. What do you do next?

Many security firms test your skills and aptitude during interviews and hands-on assessments.  What would you do? Some ideas: – ifconfig -a – route – nmap -A 10.5.1.0/24 – ./nikto -h 10.5.1.10 – dirbuster (use zapproxy) – sqlmap ./sqlmap.py -u “http://dmza.example.net/authors.php?id= -users -dbs Also, view source, edit robots.txt

Read More →

Recent Posts

  • The Best Last Minute Cram Study Guide to Pass the Security+ Exam
  • What is VM detection?
  • Hacker Tools Top Ten – Our recommended pentesting tools for 2017
  • What is Information Security?
  • SQL Injection Links, Cheat Sheets and Tools

Archives

  • March 2018
  • February 2018
  • August 2017
  • June 2017
  • January 2017
  • September 2016
  • August 2016
  • July 2016
  • June 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016
  • January 2016

Categories

Information Security Podcasts

A roundup of Information Security podcasts:

  1. Brakeing Down Security
  2. Southern Fried Security Podcast
  3. Silver Bullet Security Podcast
  4. Defensive Security Podcast
  5. Paul’s Security Weekly
  6. Down the Security Rabbithole
  7. OWASP 24/7
  8. Risky Business
  9. The Standard Deviant Security Podcast
  10. Take 1 Security Podcast
  11. 2 Minute Cyber Security Briefing
  12. SANS Internet Storm Center Podcast
  13. Security Current Podcast
  14. Security Now
  15. Threatpost Digital Underground
  16. NETSEC TL;DR

Recent Comments

    Meta

    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org
    • HOME
    • ABOUT
    • CONTACT
    • DISCLAIMER
    • PRIVACY POLICY
    Design by Westside Virtual © Copyright 2016 - 2018 Westside Virtual, Inc. All rights reserved.