[ Auditing With OWASP ] :: [ Class 1: Beginning ]

OWASP
This entry is part 2 of 3 in the series [ Auditing With the OWASP Top 10 ]

This is post 2 of 3 in the series “[ Auditing With the OWASP Top 10 ]” The OWASP Top Ten Project First, see the wiki entry on the project at: https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The Top Ten proper: https://www.owasp.org/images/7/72/OWASP_Top_10-2017_%28en%29.pdf.pdf (yes really). While you’re at it, get the Testing Checklist: https://www.owasp.org/index.php/Testing_Checklist You’ll need the OWASP Proactive Controls for …

[ Hacker Night School ] :: WEP Cracking Basics in Kali

This entry is part 16 of 17 in the series [ Hacker Night School ]

This is post 16 of 17 in the series “[ Hacker Night School ]” Wifi Cracking: Start With the Basics: WEP WEP is so old and weak you’ll hardly ever find it in use, though there are always the few who haven’t paid attention. WEP cracking is a great way to get familiar with the …

[ Hacker Night School ] :: Tsuki CTF Pwns Access on HackTheBox

Tsuki CTF HackTheBox: Access
This entry is part 14 of 17 in the series [ Hacker Night School ]

This is post 14 of 17 in the series “[ Hacker Night School ]” Tsuki’s capture the flag Speedruns of HackTheBox machines are WAY too fun, and addictive as candy. I’m going to use this particular vid as a test, to see how useful a full explanation is for my Hacking 101 students. Hacking Access …