Pentestwiki

The most comprehensive free Penetration Testing Wiki

INFRASTRUCTURE PENETRATION TESTING

The most important foundation in Penetration Testing and Read Team Operations based on standards such as PTES, CEH, OSSTMM among others

● PHASE I: Reconnaissance

● PHASE II: Scanning

● PHASE III: Enumeration

● PHASE IV: Exploitation

● PHASE V: Post exploitation

● PHASE VI: Covering Tracks

● PHASE VII: Lateral Movement

WEB APPLICATION PENETRATION TESTING

Learn how to perform Web Application Penetration Testing to test websites, APIs, SQL injections, SSL/TLS attacks and OWASP TOP 10

Intro to web application testing

Types of Web Application Attacks

OWASP TOP 10 explained

Attacks on SSL/TLS protocols

Webpentest through SOCKS proxy

Tools for Web Penetration Testing

MOBILE APPLICATION PENETRATION TESTING

Learn how to hack mobile apps for Android and iOS and protect them against tampering

Static Analysis for Android and iOS

Dynamic Analysis for Android and iOS

Protections to mitigate attacks

RED TEAMING

Red teaming tools to test defensive systems and simulate advanced attacks

Tools and Frameworks for RED TEAMS

Tools and Frameworks for BLUE TEAMS

Tools and Frameworks for APPLICATION SECURITY

Latest from blog

Because Computer Security matters…

How to scan a host with RustScan

When performing a penetration test, one of the most crucial parts is scanning and enumeration. Because if you lose any important port at this stage, you are letting go a[…]

Read more

How to download Windows legally for FREE for your pentesting labs or malware analysis

Sometimes we need a fresh Windows to use it as a Sandbox, try some exploits, etc… the best method is to virtualize it using VirtualBox or VMware, but how to[…]

Read more

Note taking for the OSCP certification

Doesn’t matter if your are doing a pentest engagement for a client or getting through your OSCP certificate, note taking is a mandatory skill. You can use Microsoft Onenote as[…]

Read more