Ռեսուրսներ > Ամսագրեր > PenTest
Cyberwar & Cybercrime Regular
- Taking the Physical Penetration Test
- Physical Security Holistics
- Physical Penetration Testing: Out of the Dark and Into the Light
- The Physical Aspects of Cybersecurity and Their Importance
- Anatomy and Mitigation of Different DOS Attacks
- Wireless Eurynomus: A wireless (802.11) Probe Request Based Attack
- Working with Exploitation Frameworks: Metasploit
- Autistic Savant Penetration Tester
- Penetration Testing in the Cloud
Using and Making of ZAP – WAPT 06/2012
- Web Service Security: REST vs. SOAP - which and when you should use
- Security Products or Door for Hackers? A Report on the Vulnerability Trends in Security Products
- Firewall Audit - are you sure your firewall isn't a next gate for hackers?
- Making of Zed Attack Proxy - check if you can help OWASP with that
- Get it on with ZAP - tutorial for all
- WebVulScan - new open source scanner developed by one student