Aug
24
In Part 1 of Pentesting 101: Surveying, we discussed the Metasploit framework and how to create a database of network and host information in addition to how you can route packets and connections through a host. In Part 2, we will cover other tools to use during a penetration test as well as troubleshooting techniques. Read More
Aug
12
In the last article we covered how to catch a callback from a target network. Catching a callback is not necessarily a tough task but it does require a bit of finesse and accurate parameters. Once you have a foothold on the network, it’s now time to find out where to move and where to maintain a presence within the target environment. Read More
Aug
03
Penetration testing is a fulfilling and lucrative position within the cyber security industry. Otherwise known as ethical hackers, pentesters work with companies to exploit weaknesses in their network, systems, and applications to ultimately create a safer online environment. Read More
Jul
22
Breaking into the Information Security field might seem impossible from the outside, but in reality, all it takes is training and practice. If you’re interested in pursuing a role within this exciting field, we’ve compiled some key points to know as you kickstart your career. Read More
Jul
14
In our last blog post, we identified the first three tools Pentesters need to know, which include various social media platforms for information gathering as well as Nmap and FPing for host / port scanning. In part two, we will continue to take a look at a few other key tools needed and when they should be used. Read More
Jun
24
Around this time last year, employees around the world were forced to bring their work home without knowing when, or if, they could return to their usual working environments. This resulted in an immediate and massive shift in the work landscape as we all tried to adapt to our “new normal”.  Read More
Jun
18
IT and Information Security are highly practical and hands-on fields. As a result, Penetration Testers of all levels should be familiar with the tools needed to be successful in their work. But what exactly are those tools? In part one of this two part blog series, we’ve compiled a short list of the top tools every Penetration Tester should know, and when to use them. It is important to note that a thorough penetration test is composed of six crucial phases: Engagement, Information Gathering,... Read More
Jun
11
This week was an incredibly exciting one for the entire INE team. Not only did we successfully host our first ever redefINE keynote event, but we made some major announcements that are helping us break down the barriers to education. Read More
Jun
10
INE was thrilled to have Brian Krebs join day one of our redefINE keynote event earlier this week! If you missed it live, we've included a detailed recap below. Read More
Jun
04
To any aspiring cyber and IT security students asking themselves if they can become experts on their own, look no further.  Read More

Subscribe to INE Blog Updates

New Blog Posts!