Recent Articles
Best Bug Bounty Resources
Finding the best bug bounty resources is easier than you think. They can be as…
Best Bug Bounty YouTube Channels
YouTube is a platform that entertains all types of niches. If you are looking for…
The Best VMs on VulnHub
VulnHub is a great pen testing tool especially for beginners. What VulnHub excels on is…
Our Blog
Best Bug Bounty Resources
Finding the best bug bounty resources is easier than you think. They can be as close as your social media page or a Discord server you join in yet can be as niche as going through specific bug bounty websites and programs If you want a headstart in finding for the bug bounties, then please consider reading our article. Social Media Social Media may be seen as nothing but fluff and nonsense but for the most resourceful bug bounty hunters, websites like Facebook and Twitter can be great resources. The most prolific way to get resources is to follow the…
Best Bug Bounty YouTube Channels
YouTube is a platform that entertains all types of niches. If you are looking for pen testing and cyber security channels, there are surprisingly a lot of them. Refer to our best bug bounty YouTube channels guide if you want to see the most recommended YT personalities regarding CTF, pen testing and competitive HTB. LiveOverflow https://www.youtube.com/watch?v=J2icGMocQds If you know CTF, then you probably have heard of LiveOverflow. As of this writing, he has more than 550,000 subscribers under his belt for plenty of good reasons: a great personality, awesome video content and plenty of helpful guides and analyses on CTF…
The Best VMs on VulnHub
VulnHub is a great pen testing tool especially for beginners. What VulnHub excels on is its almost unlimited resources of virtual machines - VMs for short. If you are looking for the best ones, here is a shortlist of great virtual machines according to experienced VulnHub users. Best of all, they are completely free to use. Mr. Robot Considered as the most used Virtual Machines on the hub, Mr. Robot is based on the same show with the exact title. The machine has 3 hidden keys that you need to find on different locations. Obviously, your goal is to find…
Hacking the Box Best Challenges
Hacking the Box (HTB) is known as one of the best pen testing sources for both beginners and professionals. It offers a wide range of tools to use and has a great variety of virtual PCs for you to work on. One of the best features of HTB is its challenges that offer many forms of pen testing that will certainly hone your skills. We rounded up the best challenges in the program that you may want to refer to. Reversing Reversing is a short term for reverse-engineering. Here, you get to play with various reversing tools to discover specific…
What is Metasploit?
Metasploit is a pen testing framework which is used by both ethical hackers and malicious attackers to analyze vulnerabilities within a system, network or server. It is also an open source framework, making it highly modifiable by anybody who has the knowledge of penetration testing. It is highly flexible between various operating systems. Metasploit lets you work with custom codes that are premade for convenience. These codes are usable to probe the weaknesses within the network. You can use these identified weaknesses as documented information to analyze which solutions should be deployed. Metasploit is a great convenient method to discover…
Hacking The Box (HTB) vs VulnHub
There are quite a number of very good pen testing sources to use. For this article, we will discuss two of the most used sources: Hacking The Box and Vulnhub. Both are very useful but some would argue that one is better than the other. Are there any huge differences? Why should you prefer HTB over VulnHub or vice versa? Let's take a look at both of these and see if they make any changes. Why HTB and VulnHub Simply said, HTB and VulnHub are among the most used sources for pentesters. Both have a great number of PCs, CTF…
Best Tools for Running CTF Hacking Games
Flag competitions can help to improve safety skills and identify talent. Use these tools and frameworks to design and conduct your own CTF event. It is not so long ago that such activities were of dubious reputation and dubious legality. Nowadays, everything is disclosed and very respectable, even if the participants take an alias and play Bond villain. To stop the cyber-attacker, you need to think like the cyber-attacker. Hackers created Capture the Flag (CTF) contests to hone their skills where they compete for p0wn servers and gain credibility. Overview CTFs for corporate security personnel are a win-win situation for…
What is Grey Box Penetration Testing?
What is Grey Box Penetration Testing So you understand black box external penetration testing. Now it's time to move on to grey box penetration testing. Grey box testing is for a presenter with only partial knowledge of the internal structure of a network. Grey box testing is the perfect hybrid of the straightforwardness of black box testing and the code targeting of white box testing. Because grey box testing uses the assertion method to present all the conditions of a program, it is based on requirement test case generation. In order to verify its correctness and make it easy to…
Metasploit Meterpreter Cheat Sheet
What is a Meterpreter? Well, if you are planning to hack like a pro, then you need to know some of the basic commands for Metepreter exploits, before you dive in below. A Meterpreter is a dynamic and advanced extensible payload. It deploys in-memory DLL injection stagers. Moreover, it extends over the network during runtime. Nevertheless, t communicates over the stager sockets to provide a client-server Rubi API. Written by Skape for Metasploit 2.x, there has been an overhaul of the standard extension, and the current one is Metasploit 3.3. Typically, the server side is implemented using plain C and…
What Is Ethical Hacking And What Is An Ethical Hacker?
We've all heard of the term hacking and we've all had that image in our heads when it comes to hacking. A bunch of random numbers, flickering rapidly through the screen, only the man in front of the monitor seemingly aware of what's going on… But hacking in real-world circumstances paints a different picture that more or less isn't far from the one painted above. Ethical hacking is a term given by a company or an individual that is said to perform by identifying, in a computer or network, potential threats. They do so, not with malicious intent, but with…