Resources > Magazines > PenTest
IS Risk Assessment PT A&S 08/12
- Types Of Controls That Can Be Implemented
- Technics of Rapid Risk Assessment
- Steganography – its meaning in IS
- How to measure IS Risk assessment?
- Metrics from
- auditing / compliance and pentesting activities
- network devices, systems
- Disposable Malware and Drive-by Download Attacks
- Biometrics - A web based face mask prediction system from only fingerprints
Malware – PenTest Reglar
- How to find and control flash cookies
- How to use MsfPayload&MsfEncode
- How to manually indetify malware
- How to use malware during a penetration test
- How you should start with exploitation frameworks
- More about NISPOM