Search results

  • The HackerSploit forum can be accessed here
  1. HackerSploit

    Penetration Testing Methodologies

    A penetration testing methodology is a comprehensive methodical approach that is used in penetration testing to identify vulnerabilities and weaknesses in the overall security posture of an organization. Advantages of using a methodology A clear methodical and systematic approach to testing...
  2. HackerSploit

    Introduction To Penetration Testing

    What is penetration testing? Penetration testing is the process of simulating an attack on a network or system to evaluate the security posture of the system and identify vulnerabilities that can be exploited. This is achieved by simulating various types of attacks on the target network or...
  3. HackerSploit

    Confidentiality, Integrity And Availability

    The CIA Triad is an integral part of Infosec, it involves the use of 5 essential features to ensure that data is kept secure. Confidentiality - This ensures that data is accessible to only those that have authorized access. Example; encryption of data to prevent unauthorized access. Integrity...
  4. HackerSploit

    Essential Infosec Terminology

    Threat - A threat is a malicious actor whose objective is to breach, cause damage, steal or exfiltrate data from a network or system. Threats usually target assets. Assets - Assets are typically business or service critical systems on a company network that store data, provide services to...
  5. HackerSploit

    Introduction To The Course - What We Will Be Covering

    Section 1 - Essential Terminology Section 2 - Introduction To Penetration Testing & Penetration Testing Methodologies Section 3 - Setting Up A Pentesting Lab Section 4 - Passive Information Gathering (OSINT & Publicly Available Information) Section 5 - Active Information Gathering Section 6 -...
  6. HackerSploit

    How To Setup A Malware Analysis Environment With FLARE VM

    Setting Up Our Environment Welcome to the Malware Analysis Bootcamp. We will be covering everything you need to know to get started in Malware Analysis professionally. In this video, we will introduce you to malware analysis, the objectives of malware analysis and the various types of malware...