Tagged: Penetration Testing

Python programming

Reconnaissance with Maltego WHOIS Nslookup on pentest targets

For those who have read my first chapter on my book on the Linux Command Line will know it will also cover the basics on Penetration Testing. The objective of the book is to teachers readers to use the Linux Terminal, program simple projects and learn about the Internet. All three skills are valuable and taken together they form an essential set of skills for those working as computer scientist, engineering and data science. The book I am writing consist...

Penetration testing A Hands-on introduction to hacking by Georgia Weidman Review!

Penetration testing A Hands-on introduction to hacking by Georgia Weidman Review!

As I have studied Computer Science I am naturally interested in Penetration Testing. No one wants to leave their computer or mobile devices unprotected, but I also wanted to know more on how such dark arts are performed. I don’t want to know that because I want break into some one’s computer but I would like to know just how the worlds IT infrastructure is vulnerable to people pressing keys on their keyboards a world away. As such I have a...