by pentaROOT | Nov 8, 2017 | Education
There are five phases of penetration testing. While others may break these down further, these five phases summarize the process of any penetration test. These phases may be done in any order, but are typically accomplished as outlined here. Ethical tests commonly...
by pentaROOT | Nov 6, 2017 | Recon, Tools
Metadata is data that describes data. Document metadata is hidden to the standard user and includes details such as usernames, file system paths, email addresses, and many other useful bits of information. Many document types contain some amount of metadata, but some...
by pentaROOT | Nov 4, 2017 | Software
This tutorial demonstrates how to install and configure Offensive Security’s Kali Linux image in VMware Workstation. Software VMware Workstation Pro 14 [download] from VMware Kali Linux image 2017.2 [download] from Offensive Security Install VMware...