Latest and greatest

11 Protocols You’ve Got To Know

OK, so let’s start by asking: What exactly are Protocols? Protocols are rules. Think of protocols as ‘accepted standards’ – which we all agree […]

read more

What Is Hydra?

What is Hydra? Hydra is a very well-known and respected network logon cracker (password cracking tool) which can support many different services. (Similar projects and […]

read more

Wireshark

Wireshark is a very powerful and popular network analyzer for Windows, Mac and Linux. It’s a tool that is used to inspect data passing […]

read more

WiFi Hacking Basic Attacks

The inspiration of this post owes itself to our newly re-launched Hacking Tools directory which contains a bunch of Wireless Hacking tools and frameworks […]

read more

How To Become A Penetration Tester

How Do I Become A Penetration Tester/ Ethical Hacker? We Ask The Experts! We are often asked by students “How Do I Become An […]

read more

Mobile Forensics Tools

We are big on our pentesting and hacking tools lists, for example, “Our Top Ten Linux Penetration Testing Linux Distro’s”, “Our 2013 recommended penetration […]

read more

5 Major Types of DOS Attack

Summary of 5 Major DOS Attack Types We have become fascinated by DoS attacks in the office ever since our Hacker Hotshot web show […]

read more

Comptia Salary Expectations

How much can I expect to earn with a Security+ certification? Let’s cut the chase and talk about bringing home the bacon. How much […]

read more

300 Interview Questions

300 Information Security Interview Questions! Update! It’s been three years since we wrote this post! Here’s the latest and updated PDF that you can […]

read more

Metasploit For Beginners

Metasploit for beginners – a concise introduction Having recently blogged about the world’s most scary pentest tools we thought we should write something about […]

read more