penetration testing

Pierluigi Paganini May 10, 2016
Hackers Crack Businesses’ Security Using Social Engineering

A group of white hat hackers from RedTeam traveled to the Midwest to test the systems of a major power company and breach it with Social Engineering. RedTeam Security is a group of ethical hackers who specialize in offensive security, believing that the best defense is a good offense. Engaging in social engineering, in addition […]

Pierluigi Paganini November 08, 2015
The Infernal-Twin tool, easy hacking wireless networks

The Infernal-Twin is an automated tool designed for penetration testing activities, it has been developed to automate the Evil Twin Attack. The Infernal-Twin is an automated tool designed for penetration testing activities, it has been developed to assess wireless security by automating the Evil Twin Attack. “The tool was created to help the auditors and penetration testers […]

Pierluigi Paganini October 28, 2015
US Army Experts Call for military bug bounty program AVRP

US Army Military experts urge the establishment of an Army Vulnerability Response Program (AVRP),  a sort of military bug bounty program. What happen when bug hunters have to work with high sensitive environment? An interesting post published by the Cyber Defense Review raises the discussion about the was way to handle vulnerabilities in the information security infrastructure of the […]

Pierluigi Paganini August 31, 2015
PowerMemory, how to extract credentials present in files and memory

This post explains how to use the PowerMemory script to reveal the passwords used by users of the computers running under Windows systems. Disclaimer Any actions and or activities related to the material contained within this blog is solely your responsibility.The misuse of the information in this website can result in criminal charges brought against […]

Pierluigi Paganini May 19, 2015
How hackers use Robots txt to harvest information

The penetration tester Thiebauld Weksteen has published an interesting analysis to explaine the importance of robots.txt for the hacking activities. Thiebauld Weksteen, a penetration tester from Melbourne is advising system administrators that robots.txt can give precious details to hackers, when it comes to attacks, because robots.txt as the capability to tell search engines which directories […]

Pierluigi Paganini July 31, 2014
Zero-day flaws affect Symantec Endpoint Protection

Pen Testers at Offensive Security discovered Zero-day flaws in Symantec Endpoint Protection that could be exploited to gain full system access. Yesterday I reported the results of the study conducted by the security researcher Joxean Koret which publicly revealed a series of flaws affecting 14 of 17 major antivirus engines. The security experts remarked that antivirus products are […]

Pierluigi Paganini October 29, 2013
Business Intelligence – Intro to reconnaissance

Exploring the Business Intelligence module proposed by the online course of the Hacker Academy – Intro to reconnaissance phase for a penetration testing. One of the most important components of the reconnaissance process in pen testing activity is the business intelligence. Once chosen the target it is important to gather business information on it before […]

Pierluigi Paganini October 20, 2013
The Hacker Academy on Penetration Testing

Penetration testing is a skill, a profession that requests specific capabilities and the respect of strict rules. Hacking is different from pen testing … Professional hackers are an essential component in today IT landscape, in a previous post I highlighted the great request of the market for so precious figures. Being a hacker is a […]

Pierluigi Paganini August 19, 2013
Cybercrime-as-a-Service, the rise of hacking services

Security expert Dancho Danchev profiled one of the numerous hacking services offered in the underground highlighting new trends in the cybercrime ecosystem. With the term attack-as-a-service model is indicated the practice to outsource all the phases of an attack to specialists instead to rent tools and architecture to conduct personally the illegal activities (Malware-as-a-Service). Danchev […]

Pierluigi Paganini July 24, 2013
Web Application Vulnerabilities 2013 – Context Information Security

Context Information Security  issued the report “Web Application Vulnerability Statistics 2013” that provides statistic on Web Application Vulnerabilities based on data gathered from a range of IT security activities and consultancy engagements during last three years. The number of data breaches is increasing in concerning way also thanks to numerous cyber attacks that exploited Web Application Vulnerabilities in many web […]