Pentestwiki

The most comprehensive free Penetration Testing Wiki

INFRASTRUCTURE PENETRATION TESTING

The most important foundation in Penetration Testing and Read Team Operations based on standards such as PTES, CEH, OSSTMM among others

● PHASE I: Reconnaissance

● PHASE II: Scanning

● PHASE III: Enumeration

● PHASE IV: Exploitation

● PHASE V: Post exploitation

● PHASE VI: Covering Tracks

● PHASE VII: Lateral Movement

WEB APPLICATION PENETRATION TESTING

Learn how to perform Web Application Penetration Testing to test websites, APIs, SQL injections, SSL/TLS attacks and OWASP TOP 10

Intro to web application testing

Types of Web Application Attacks

OWASP TOP 10 explained

Attacks on SSL/TLS protocols

Webpentest through SOCKS proxy

Tools for Web Penetration Testing

MOBILE APPLICATION PENETRATION TESTING

Learn how to hack mobile apps for Android and iOS and protect them against tampering

Static Analysis for Android and iOS

Dynamic Analysis for Android and iOS

Protections to mitigate attacks

RED TEAMING

Red teaming tools to test defensive systems and simulate advanced attacks

Tools and Frameworks for RED TEAMS

Tools and Frameworks for BLUE TEAMS

Tools and Frameworks for APPLICATION SECURITY

Latest from blog

Because Computer Security matters…

How to use Nuclei for vulnerability scanning

Nuclei is a tool developed by Project Discovery team, as they say it is a Fast and customizable vulnerability scanner based on simple YAML based DSL. It is similar to[…]

Read more

NIST best practices to prevent and mitigate ransomware attacks

Ransomware is a big threat to any company or corporation. In a matter of minutes all data from servers, workstation, laptops can be encrypted and most probably lost. Also worth[…]

Read more