Open in app

Sign In

Write

Sign In

Suresh Sundaram
Suresh Sundaram

135 Followers

Home

About

May 7, 2021

Metasploit & Nexpose Hacking Part -II

METASPLOIT FRAMEWORK — THE HACKER’S BREAD Welcome to the second module of this workshop. In this module, you will be studying in depth the Metasploit Framework. This will also help you study the extraordinary benefits of this security tool, which also plays a key role in the exploit development lifecycle…

7 min read

Metasploit & Nexpose Hacking Part -II
Metasploit & Nexpose Hacking Part -II

7 min read


Mar 15, 2021

Metasploit & Nexpose tutorial Part -I

You will learn more about NeXpose and Metasploit features, their usage, and how you can best utilize these tools in order to perform penetration testing or a security assessment of your organization. Specifically, in this module, you will be able to learn more about NeXpose, the great vulnerability assessment and…

6 min read

6 min read


Feb 19, 2021

Software Security Testing Part — V

Update: This article is part of a series. Check out the full series: Part 1, Part 2, Part 3, Part 4, Part 5! Security in Software Development Welcome to the last, but not the least, a module of the software security-testing workshop. So far, we have discussed how you can…

4 min read

Software Security Testing Part — V
Software Security Testing Part — V

4 min read


Jan 22, 2021

Software Security Testing Part — IV

Update: This article is part of a series. Check out the full series: Part 1, Part 2, Part 3, Part 4, Part 5! Introduction Welcome to the fourth module of the software security testing workshop. In this workshop so far we have spoken enough about security testing in software code…

4 min read

Software Security Testing Part — IV
Software Security Testing Part — IV

4 min read


Jan 6, 2021

Software Security Testing Part — III

Update: This article is part of a series. Check out the full series: Part 1, Part 2, Part 3, Part 4, Part 5! Source Code Review Tools & Techniques Introduction Welcome to the third module of the software security testing workshop. This module will specifically discuss tools available on the…

5 min read

Software Security Testing Part — III
Software Security Testing Part — III

5 min read


Dec 21, 2020

Software Security Testing Part — II

Update: This article is part of a series. Check out the full series: Part 1, Part 2, Part 3, Part 4, Part 5! Introduction Welcome to the second module of the software security testing workshop. In this module, we will be exploring different types of evaluating software security. It is…

7 min read

Software Security Testing Part — II
Software Security Testing Part — II

7 min read


Dec 9, 2020

Software Security Testing Part — I

Update: This article is part of a series. Check out the full series: Part 1, Part 2, Part 3, Part 4, Part 5! The Basics of Software Security Introduction Welcome to the first module of this workshop. In this workshop, we will be learning about the overall software security testing…

6 min read

Software Security Testing Part — I
Software Security Testing Part — I

6 min read


Oct 20, 2020

Hacking With Security Tools Part — 5

Update: This article is part of a series. Check out the full series: Part 1, Part 2, Part 3, Part 4, Part 5! Introduction Welcome to the last module of this workshop. We have been talking about hacking & exploit development so far in this workshop. Over the Internet, there…

4 min read

Hacking With Security Tools Part — 5
Hacking With Security Tools Part — 5

4 min read


Sep 30, 2020

Hacking With Security Tools Part — 4

Update: This article is part of a series. Check out the full series: Part 1, Part 2, Part 3, Part 4, Part 5! Top 10 Security Tools in Kali Linux Introduction Welcome to module 4 of this workshop. So far, you have learned about hacking with Kali Linux and a…

3 min read

Hacking With Security Tools Part — 4
Hacking With Security Tools Part — 4

3 min read


Sep 8, 2020

Hacking With Security Tools Part — 3

Update: This article is part of a series. Check out the full series: Part 1, Part 2, Part 3, Part 4, Part 5! Introduction Welcome to the exploit development module. So far, we have been talking about the ethical hacking aspects of Kali Linux. You can also use this wonderful…

6 min read

Hacking With Security Tools Part — 3
Hacking With Security Tools Part — 3

6 min read

Suresh Sundaram

Suresh Sundaram

135 Followers

Cyber Security Analyst & researcher

Following
  • Nithin Coca

    Nithin Coca

  • Jonathan Zittrain

    Jonathan Zittrain

  • yky4u

    yky4u

  • Maksim Shudrak

    Maksim Shudrak

  • Kyle Ebert

    Kyle Ebert

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech