Hasnath - hasnath.com

General Information:

Latest News:

Information Gathering for Pen Test: Active Information Gathering 1 Aug 2010 | 09:43 am

Active Information Gathering This section follows passive information gathering and is slightly more intrusive. It actually generates traffic at the organization, logs will be generated and perhaps I...

Information Gathering for Pen Test: Passive Information Gathering 31 Jul 2010 | 05:24 am

Intro to Information Gathering Information gathering (especially the passive kind) is an often overlooked area and is the grounding for any good external penetration test of the black-box variety. Th...

Penetration Testing Process 29 Jul 2010 | 06:25 am

Steps taken during a penetration test: The main steps taken during a complete penetration test would be as follows (this is discounting the Standard Operating Procedure (SOP) and meetings, etc and ju...

Social Engineering #2: The Art of Deception 28 Jul 2010 | 01:42 am

Social engineering relies on the human inability to keep up with the fast paced culture that is turning heavily towards information technology solutions. Social engineers rely on the fact that people ...

Hack the Wetware: Social Engineering #1 28 Jul 2010 | 12:53 am

Social Engineering is a form of intrusion that uses non-technical weaknesses to exploit a system, the wetware also known as people. ‘Cyber Con Artist’ a term can be used to describe the most well kno...

What is Penetration Testing? 26 Jul 2010 | 07:14 am

Penetration testing also knowns as ‘Pen Test’ widely,  is a process of establishing weaknesses in a computer infrastructure or network. A team of specialists uses real-world hacking techniques to expl...

Recently parsed news:

Recent searches: