METASPLOIT FRAMEWORK — THE HACKER’S BREAD

Welcome to the second module of this workshop. In this module, you will be studying in depth the Metasploit Framework. This will also help you study the extraordinary benefits of this security tool, which also plays a key role in the exploit development lifecycle…


You will learn more about NeXpose and Metasploit features, their usage, and how you can best utilize these tools in order to perform penetration testing or a security assessment of your organization. Specifically, in this module, you will be able to learn more about NeXpose, the great vulnerability assessment and…


Update: This article is part of a series. Check out the full series: Part 1, Part 2, Part 3, Part 4, Part 5!

Security in Software Development

Welcome to the last, but not the least, a module of the software security-testing workshop. So far, we have discussed how you can…


Update: This article is part of a series. Check out the full series: Part 1, Part 2, Part 3, Part 4, Part 5!

Introduction

Welcome to the fourth module of the software security testing workshop. In this workshop so far we have spoken enough about security testing in software code…


Update: This article is part of a series. Check out the full series: Part 1, Part 2, Part 3, Part 4, Part 5!

Source Code Review Tools & Techniques

Introduction

Welcome to the third module of the software security testing workshop. This module will specifically discuss tools available on the…


Update: This article is part of a series. Check out the full series: Part 1, Part 2, Part 3, Part 4, Part 5!

Introduction

Welcome to the second module of the software security testing workshop. In this module, we will be exploring different types of evaluating software security. It is…


Update: This article is part of a series. Check out the full series: Part 1, Part 2, Part 3, Part 4, Part 5!

The Basics of Software Security

Introduction

Welcome to the first module of this workshop. In this workshop, we will be learning about the overall software security testing…


Update: This article is part of a series. Check out the full series: Part 1, Part 2, Part 3, Part 4, Part 5!

Introduction

Welcome to the last module of this workshop. We have been talking about hacking & exploit development so far in this workshop. Over the Internet, there…


Update: This article is part of a series. Check out the full series: Part 1, Part 2, Part 3, Part 4, Part 5!

Top 10 Security Tools in Kali Linux

Introduction

Welcome to module 4 of this workshop. So far, you have learned about hacking with Kali Linux and a…


Update: This article is part of a series. Check out the full series: Part 1, Part 2, Part 3, Part 4, Part 5!

Introduction

Welcome to the exploit development module. So far, we have been talking about the ethical hacking aspects of Kali Linux. You can also use this wonderful…

Suresh Sundaram

Cyber Security Analyst & researcher

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store