Questions tagged [Penetration test] (39)

1
answer

How to get connections outside the local network "Fat Rat" (Kali Linux)?

In fact, the essence of the question in the title: How to get links from the user that is outside the local network?
lavada16 asked April 19th 20 at 12:08
1
answer

How to correctly and productively retrain IS in InfoSec?

Good day, The question is a bit broad, so try to simplify in the style task. This: Education = Master of Information Systems Position = Information Security Engineer Work = Complex Banking Security (Kaspersky, Qradar, PaloAlto etc.) Task: Go on a deeper system level, writing exploits, hacking, test applications, etc. A...
1
answer

How best to organize the API load testing in your organization?

Hello, who usually tests the APIs in companies and how best to organize it in the process of development and deployment? In addition to load testing are interested in DDOS on the API endpoints and also pentesting know the question is vague, but interested in the organization of the process and is it possible to automate? si...
leon_Mann asked March 27th 20 at 13:25
2
answers

Is there a utility to intercept the traffic for windows 7 without SP 1?

Actually, the fact is that before the laptop was actively used by burp suite, however, after the transition to the old laptop, can't find a utility to intercept traffic that would support the machine on windows 7 without SP1. The service pack does not support the processor.
Sarai.Rob asked March 27th 20 at 12:48
1
answer

Safe disable the DNS resolver?

Hello, there is Windows 10kA +the dev with Kali, I need to run the reverse-proxy to test one of phishing, the company program requires to be free 443/80 ports and 53, for this they need to be open? and is it safe to disable systemd/dns resolver and so on, so as not to affect the main axis, and an Internet connection?
kendra.Treutel75 asked March 21st 20 at 13:56
5
answers

How to check someone else's code for security, if not particularly versed in the intricacies of language?

Almost all development on the web lately is to copy-paste code from SO How to protect yourself from "leaky", or insecure code Whether the network is a specialized service that checks code for security reasons?
Addison.Dooley asked March 21st 20 at 11:44
3
answers

The book is about safe code?

What is the book about JS, about how to write secure code, which describes typical mistakes of beginners, with the basics such as the so-called "foolproof" and then, in English, or even what functions it is advisable not to use and which ones to avoid at all times and for all
Cullen.Pollich asked March 19th 20 at 19:59
3
answers

Earnings on freelance for pentester?

Generally interested in where you can still find customers for such works in addition to upwork? In the Russian segment in General, all muffled. Can someone tell me?
cierra_DAmore asked March 19th 20 at 19:55
1
answer

Why Reaver didn't want to connect even with a pincode?

Raspberry pi 3 model B (connected over ssh) Tp-link tl-wn722n (AR9271 qualcomm Atheros Communications)airmon-ng start wlan1:ifconfigifconfig eth0: flags=4099<UP,BROADCAST,MULTICAST> mtu 1500 ether b8:27:eb:d0:dd:86 txqueuelen 1000 (Ethernet) RX packets 0 bytes 0 (0.0 B) RX errors 0 dropped 0 overruns 0 frame 0 TX...
myrl_Strosin asked March 17th 20 at 11:43
0
answer

How to translate a network card of the smartphone in monitor mode while in the chroot environment Kali Linux from android?

Is the Xiaomi Mi A1 with Android OS 8.1 Lineage. On the memory card is set Kali Linux using Linux Deploy. I have an interface wlan0 in managed mode. I create a new interfaceiw dev wlan0 interface add mon0 type monitor Raise the interface ip link set mon0 up Kill all processes that might interfere airmon-ng check kill Thus k...
Miguel.Turner53 asked March 17th 20 at 08:51