Learn Pentesting like a Pro!
Subscribe
Sign in
Home
Archive
About
New
Top
Basic recommendations to avoid #ransomware attacks
CISA give us some guidance to avoid this raising trend: Preparing for Ransomware Maintain offline backups of data, and regularly test backup and…
pentesting.academy
Feb 28
1
Share this post
Basic recommendations to avoid #ransomware attacks
pentesting.academy
Copy link
Twitter
Facebook
Email
Apply this 10 rules to defend your Kubernetes cluster properly
Ten security recommendations to protect your Kubernetes deployment
pentesting.academy
Feb 20
Share this post
Apply this 10 rules to defend your Kubernetes cluster properly
pentesting.academy
Copy link
Twitter
Facebook
Email
Patch your VMware ESXi now!
Ransomware attacks are raising against ESXi infrastructure
pentesting.academy
Feb 13
Share this post
Patch your VMware ESXi now!
pentesting.academy
Copy link
Twitter
Facebook
Email
✅ Quick guide for password cracking
Learn different techniques to create custom wordlists from the content of a website and how to use John the Ripper or Hashcat to crack Windows or Linux…
pentesting.academy
Feb 8
Share this post
✅ Quick guide for password cracking
pentesting.academy
Copy link
Twitter
Facebook
Email
SSRF cheat sheet for AWS, GCP and Azure
In a Server-Side Request Forgery (SSRF) attack, the attacker can abuse functionality on the server to read or update internal resources. The attacker…
pentesting.academy
Feb 6
Share this post
SSRF cheat sheet for AWS, GCP and Azure
pentesting.academy
Copy link
Twitter
Facebook
Email
🥷 Top sites for passive reconnaissance
Passive reconnaissance is a critical step for bug bounties or penetration testing engagements, get ready!
pentesting.academy
Feb 3
Share this post
🥷 Top sites for passive reconnaissance
pentesting.academy
Copy link
Twitter
Facebook
Email
January 2023
Top 10 smart contract vulnerabilities on Ethereum
Understand what are the most common security threats within the Ethereum Smart Contracts
pentesting.academy
Jan 21
Share this post
Top 10 smart contract vulnerabilities on Ethereum
pentesting.academy
Copy link
Twitter
Facebook
Email
Hacking Ethereum EVM: Get Txs & OPcodes basics
To grab big bounties in Web3 you rather get inside the Matrix =D
pentesting.academy
Jan 20
Share this post
Hacking Ethereum EVM: Get Txs & OPcodes basics
pentesting.academy
Copy link
Twitter
Facebook
Email
How to scan a host with RustScan
After using nmap and unicornscan for a while, RustScan is probably the fastest to scan TCP and UDP ports, learn how to use it
pentesting.academy
Jan 18
Share this post
How to scan a host with RustScan
pentesting.academy
Copy link
Twitter
Facebook
Email
Fuzzing with Radamsa in BlackArch
When looking for new vulnerabilities, fuzzing, is a great technique to crash apps with unexpected data, learn how to do it.
pentesting.academy
Jan 18
Share this post
Fuzzing with Radamsa in BlackArch
pentesting.academy
Copy link
Twitter
Facebook
Email
✅ Best commands for Port Scanning — For OSCP, pentests, bug bounties
Learn several techniques to scan hosts, bypass firewalls and scan the whole IPv4 universe.
pentesting.academy
Jan 13
Share this post
✅ Best commands for Port Scanning — For OSCP, pentests, bug bounties
pentesting.academy
Copy link
Twitter
Facebook
Email
🥷 Brute-force attacks Cheat Sheet (FTP, POP3, SNMP, SSH, VNC, …)
Improve your pentesting skills with the following techniques.
pentesting.academy
Jan 12
Share this post
🥷 Brute-force attacks Cheat Sheet (FTP, POP3, SNMP, SSH, VNC, …)
pentesting.academy
Copy link
Twitter
Facebook
Email
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts