Table of Contents
[[ This course requires registration. Use the Register link above. We do not share ANY information with ANYBODY. ]]
[catlist name=pen-testing orderby=series order=asc numberposts=50]
Just a place I collect my thoughts.
Pen testing is different from CTF (capture the flag), and different from security auditing. In this section we’ll explore some of the tools and techniques for real-life penetration testing.
[[ This course requires registration. Use the Register link above. We do not share ANY information with ANYBODY. ]]
[catlist name=pen-testing orderby=series order=asc numberposts=50]