Penetration testing course: 0x02.1 Fundamentals of binary arithmetic

Any information processed by a computer is stored in binary format so it is fundamental that anyone is familiar with this numeral system. DECIMAL SYSTEM When we count we normally use the decimal system (base 10). Ten is the number which is the count of fingers and thumbs on both hands (or toes on the feet). Positional decimal systems include a …

Penetration testing course: 0x01 Introduction

I often receive messages from people asking me how to become a hacker, how to hack a website or how to become a professional penetration tester. I usually reply case by case if I’m free and if I feel the person is truly interested in the field and he’s not trying to do some illegal activities (often without the minimum …

Hardware assisted penetration testing

Penetration testing or pentesting is the practice of attacking your own or your clients’ IT systems in the same way a hacker would to identify security holes. Prior to start with the penetration testing you normally need to clearly define the scope and get a written consent from the client, in other words you need a pre-engagement contract signed by …

Ditch PsExec, SprayWMI is here ;)

PsExec is an utility developed by Sysinternals and then acquired by Microsoft that allows to control a Windows computer by using the command line and represents a light-weight alternative to telnet. Unlike other remote administration tools it doesn’t require to install a client on the remote computer and it doesn’t need any complicated setup, just copy PsExec onto your executable …