Pentesting Stories

Refine by tag:
pentesting
pentesting

18 Stories

  • SilverStone by OctoomyProductions
    OctoomyProductions
    • WpView
      Reads 8
    • WpPart
      Parts 1
    Hello, my name is Jason L King, I was the leader of a cyber terrorist gang called SilverStone, throughout the years, I witnessed more things I would like to admit. I am going to tell my story from when I was a simple skript kiddie just infecting my own school PCs with Poison Ivy to my arrest in 2020 for a ransomware attack against SLOBS. Here is my story. Withness the start of the Jason's story from the beginning to the end, in his biography.
  • Penetration Testing Services by allendevaux
    allendevaux
    • WpView
      Reads 3
    • WpPart
      Parts 1
    Penetration testing, often referred to as "pen testing," is a crucial cybersecurity practice that involves simulating cyberattacks on a system, application, or network to identify vulnerabilities and weaknesses that malicious actors could exploit. Penetration testing services are typically offered by cybersecurity firms, individual consultants, or in-house security teams to help organizations assess and improve their security posture.
  • Pentesting GraphQL: 5 Must-Know Challenges & Powerful Solutions by Bornsec
    Bornsec
    • WpView
      Reads 3
    • WpPart
      Parts 1
    GraphQL is a powerful query language that is widely used for developing modern web applications. However, just like any other web application, GraphQL applications are not immune to security vulnerabilities. Contact us: +91 9900 53 7711 Please write to us: info@bornsec.com Visit us: https://bornsec.com/ https://bornsec.com/pentesting-graphql-5-key-challenges-and-solutions/
  • borned to be Hacker by MostafaNb
    MostafaNb
    • WpView
      Reads 71
    • WpPart
      Parts 2
    story of a 23 years old boy that started contact with computers at early age, he loves to practice his skills in hacking for both fun and profit and for evil sometimes .... To be continued
  • Hire a Hacker without Upfront ? by Bompani989
    Bompani989
    • WpView
      Reads 90
    • WpPart
      Parts 1
    Most hackers for hire are found on Reddit-like forums. There are a bunch of them, and you have to know where to look. But these hackers remain anonymous, offering certain services, and demand decentralized payment. Knowing A Genuine Or Fake Hacker Firstly, you need to know that no genuine hacker uses emails such as Yahoomail, Gmail, or mail addresses that are not encrypted. You need to be so inquisitive when dealing with hackers to know if they are genuine. The famous hacker platforms include Dark basin forum, HL etc. The platforms specifically hire hackers with all the necessary qualifications. However, the hackers usually ask for an upfront fee of about 50%. Find more hacking services on https://repaircopycat.wixsite.com/darkbasin
  • WEB APPLICATION PENETRATION TESTING by cybersecurityhive
    cybersecurityhive
    • WpView
      Reads 3
    • WpPart
      Parts 1
    Test to identify any vulnerabilities on web applications and to assess the impact of vulnerabilities by exploiting multiple attempts. The ideal time for a web application penetration test is before the site is live and exposed to potential threat but fully developed.
  • Pentesting JWT: It is essential to understand by Bornsec
    Bornsec
    • WpView
      Reads 2
    • WpPart
      Parts 1
    JWT stands for JSON Web Token, an open standard designed for securely sharing information between a client and a server. Each JWT consists of encoded JSON objects that contain a set of claims. These tokens are signed using a cryptographic algorithm to ensure the integrity of the claims, preventing any alterations after the token has been issued. Contact us: +91 9900 53 7711 Please write to us: info@bornsec.com Visit us: https://bornsec.com/