SANS Penetration Testing

So You Wanna Be a Pen Tester? 3 Paths To Consider (Updated)

Tips for Entering the Penetration Testing Field By Ed Skoudis It's an exciting time to be a professional penetration tester. As malicious computer attackers amp up the number and magnitude of their breaches, the information security industry needs an enormous amount of help in proactively finding and resolving vulnerabilities. Penetration testers who are able to … Continue reading So You Wanna Be a Pen Tester? 3 Paths To Consider (Updated)


SANS Poster: Building a Better Pen Tester - PDF Download

Blog Post by: SANS Pen Test Team It's here! It's here! The NEW SANS Penetration Testing Curriculum Poster has arrived (in PDF format)! This blog post is for the downloadable PDF version of the new "Blueprint: Building a Better Pen Tester" Poster created by the SANS Pen Test Curriculum. The front of theposter … Continue reading SANS Poster: Building a Better Pen Tester - PDF Download


Putting My Zero Cents In: Using the Free Tier on Amazon Web Services (EC2)

By Jeff McJunkin Counter Hack Hello, dear readers! Many times when penetration testing, playing CTF's, or experimenting with new tools, I find myself needing ready access to a Linux installation of my choosing, a public IPv4 address, and...well, not a lot else really. I like Virtual Private Servers (VPSs) for this purpose - essentially a … Continue reading Putting My Zero Cents In: Using the Free Tier on Amazon Web Services (EC2)


Your Pokemon Guide for Essential SQL Pen Test Commands

By Joshua Wright Counter Hack As a pen tester, it's not enough to exploit targets and get shells. That's great (and it's a big part of what we do), but the real value to the customer is to demonstrate what the effective risk is from the successful exploitation of a vulnerability. In order to answer … Continue reading Your Pokemon Guide for Essential SQL Pen Test Commands


Exploiting XXE Vulnerabilities in IIS/.NET

By Chris Davis XXE (XML External Entity) attacks happen when an XML parser improperly processes input from a user that contains an external entity declaration in the doctype of an XML payload. This external entity may contain further code which allows an attacker to read sensitive data on the system or potentially perform other more … Continue reading Exploiting XXE Vulnerabilities in IIS/.NET