METASPLOIT FRAMEWORK — THE HACKER’S BREAD

Welcome to the second module of this workshop. In this module, you will be studying in depth the Metasploit Framework. This will also help you study the extraordinary benefits of this security tool, which also plays a key role in the exploit development lifecycle. Metasploit is the bread and butter for many information security professionals or pentesters.

There are a couple of good exploitation tools available in the market that are used by security professionals, however, Metasploit leads the industry due to a couple of reasons. There are other tools available, like Core Impact…


You will learn more about NeXpose and Metasploit features, their usage, and how you can best utilize these tools in order to perform penetration testing or a security assessment of your organization. Specifically, in this module, you will be able to learn more about NeXpose, the great vulnerability assessment and management software available on the market. In the field of security testing or penetration testing, a vulnerability assessment plays an important role in order to successfully penetrate into any network or system. …


Update: This article is part of a series. Check out the full series: Part 1, Part 2, Part 3, Part 4, Part 5!

Security in Software Development

Welcome to the last, but not the least, a module of the software security-testing workshop. So far, we have discussed how you can perform code review, how to use code review tools and methodologies along with types of code reviews. We have also learned that security should be built into the software development lifecycle. It’s worthwhile to present the concept of security during the development lifecycle.

In this module, we will be highlighting…


Update: This article is part of a series. Check out the full series: Part 1, Part 2, Part 3, Part 4, Part 5!

Introduction

Welcome to the fourth module of the software security testing workshop. In this workshop so far we have spoken enough about security testing in software code, methodologies, and different types of software testing along with different tools introduction that is available easily in the industry market. However, so far we have not presented a practical demo for performing code review.

This will be a quick module to demonstrate how you can perform code reviews before you…


Update: This article is part of a series. Check out the full series: Part 1, Part 2, Part 3, Part 4, Part 5!

Source Code Review Tools & Techniques

Introduction

Welcome to the third module of the software security testing workshop. This module will specifically discuss tools available on the Internet to perform security source code review, or simply code review. …


Update: This article is part of a series. Check out the full series: Part 1, Part 2, Part 3, Part 4, Part 5!

Introduction

Welcome to the second module of the software security testing workshop. In this module, we will be exploring different types of evaluating software security. It is recommended that you should first complete the previous module in order to build a knowledge base in this domain, which will help you continue in this workshop with a separate mindset on how to be an expert in software security testing.

Software Security Testing

Different organizations and different security professionals…


Update: This article is part of a series. Check out the full series: Part 1, Part 2, Part 3, Part 4, Part 5!

The Basics of Software Security

Introduction

Welcome to the first module of this workshop. In this workshop, we will be learning about the overall software security testing happening in the field of information security, covering many aspects of security. However, in this module, we will talk about the knowledge base, the basics of software security.

Prerequisites

* Sound knowledge in computer programming

* Sound knowledge of information security and related technologies

* Expert in any one programming…


Update: This article is part of a series. Check out the full series: Part 1, Part 2, Part 3, Part 4, Part 5!

Introduction

Welcome to the last module of this workshop. We have been talking about hacking & exploit development so far in this workshop. Over the Internet, there are many distributions which you can see as security distributions which were built for penetration testing or security testing as the main purpose. But not all of them have the strength that Kali Linux has.

In this module, we will simply present the comparison or the intros of other security-related…


Update: This article is part of a series. Check out the full series: Part 1, Part 2, Part 3, Part 4, Part 5!

Top 10 Security Tools in Kali Linux

Introduction

Welcome to module 4 of this workshop. So far, you have learned about hacking with Kali Linux and a taste of how you can utilize Kali Linux as a base platform for exploit development. Here we will highlight the top 10 security tools available in Kali Linux and their purpose.

Prerequisites

It is recommended that you should first complete the previous three modules before you start reading this module.

Suresh Sundaram

Cyber Security Analyst & researcher

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store