This is a new series of articles that will cover the complete penetration testing methodology based largely on case studies of previous hacks. These articles will cover initial reconnaissance, picking an attack vector, gaining a foothold, maintaining presence, lateral movement, and finally going after the prize. A guide to Open Source Intelligence One of the main case studies these articles will borrow from is the APT1 report published by Mandiant in 2013. Though the report focuses on a...
Course Description: Our Introduction to Penetration Testing Course is for anyone who has started in the security work field and wants to learn more about penetration testing, or those who find it difficult to present findings properly into a report or presentation.