Long story short: yes, programming is important for being a good hacker or security professional. I’m sure you already wondered about the importance of programming if you are a beginner and if you are a professional you’ll often shrug your shoulders when you see this question a lot or hear the answers. It’s a question that has been asked a …
Best books, tutorials and courses to learn about exploit development
The best resources for learning exploit development Exploit development is considered to be the climax in the learning path of an ethical hacker or security professional. It is strongly advisable to have mastered the basics before delving into this topic. Exploit development is hard and it’s not something you learn at school or university (usually), not something any of your …
Penetration testing course: 0x02 Prerequisites
I receive A LOT of private messages by people interested in “hacking”. 7 out of 10 are (sadly) people interested in learning how to hack a Facebook account, hack an email account, send spam through SMTP servers, find a good proxy for hiding their tracks while performing illegal activities (without having a clear concept of anonymity and privacy in mind) …
Hardware assisted penetration testing
Penetration testing or pentesting is the practice of attacking your own or your clients’ IT systems in the same way a hacker would to identify security holes. Prior to start with the penetration testing you normally need to clearly define the scope and get a written consent from the client, in other words you need a pre-engagement contract signed by …