METASPLOIT FRAMEWORK — THE HACKER’S BREAD
Welcome to the second module of this workshop. In this module, you will be studying in depth the Metasploit Framework. This will also help you study the extraordinary benefits of this security tool, which also plays a key role in the exploit development lifecycle. Metasploit is the bread and butter for many information security professionals or pentesters.
There are a couple of good exploitation tools available in the market that are used by security professionals, however, Metasploit leads the industry due to a couple of reasons. There are other tools available, like Core Impact…
You will learn more about NeXpose and Metasploit features, their usage, and how you can best utilize these tools in order to perform penetration testing or a security assessment of your organization. Specifically, in this module, you will be able to learn more about NeXpose, the great vulnerability assessment and management software available on the market. In the field of security testing or penetration testing, a vulnerability assessment plays an important role in order to successfully penetrate into any network or system. …
Security in Software Development
Welcome to the last, but not the least, a module of the software security-testing workshop. So far, we have discussed how you can perform code review, how to use code review tools and methodologies along with types of code reviews. We have also learned that security should be built into the software development lifecycle. It’s worthwhile to present the concept of security during the development lifecycle.
In this module, we will be highlighting…
Welcome to the fourth module of the software security testing workshop. In this workshop so far we have spoken enough about security testing in software code, methodologies, and different types of software testing along with different tools introduction that is available easily in the industry market. However, so far we have not presented a practical demo for performing code review.
This will be a quick module to demonstrate how you can perform code reviews before you…
Source Code Review Tools & Techniques
Welcome to the third module of the software security testing workshop. This module will specifically discuss tools available on the Internet to perform security source code review, or simply code review. …
Welcome to the second module of the software security testing workshop. In this module, we will be exploring different types of evaluating software security. It is recommended that you should first complete the previous module in order to build a knowledge base in this domain, which will help you continue in this workshop with a separate mindset on how to be an expert in software security testing.
Software Security Testing
Different organizations and different security professionals…
The Basics of Software Security
Welcome to the first module of this workshop. In this workshop, we will be learning about the overall software security testing happening in the field of information security, covering many aspects of security. However, in this module, we will talk about the knowledge base, the basics of software security.
* Sound knowledge in computer programming
* Sound knowledge of information security and related technologies
* Expert in any one programming…
Welcome to the last module of this workshop. We have been talking about hacking & exploit development so far in this workshop. Over the Internet, there are many distributions which you can see as security distributions which were built for penetration testing or security testing as the main purpose. But not all of them have the strength that Kali Linux has.
In this module, we will simply present the comparison or the intros of other security-related…
Top 10 Security Tools in Kali Linux
Welcome to module 4 of this workshop. So far, you have learned about hacking with Kali Linux and a taste of how you can utilize Kali Linux as a base platform for exploit development. Here we will highlight the top 10 security tools available in Kali Linux and their purpose.
It is recommended that you should first complete the previous three modules before you start reading this module.
Welcome to the exploit development module. So far, we have been talking about the ethical hacking aspects of Kali Linux. You can also use this wonderful security distribution in the exploit development. Kali Linux comes with pre-installed tools and accessories, which gives support in the exploit development lifecycle. In this module, we will not be explaining “what is exploit development” but we will be discussing where Kali Linux can be used in the exploit development.
Cyber Security Analyst & researcher