Free Standard International Shipping for orders over £50
Order by 19th December for UK delivery before Christmas
0 Cart
Added to Cart
    You have items in your cart
    You have 1 item in your cart
    Total
    Check Out Continue Shopping

    The Ultimate Port Scanning Guide: Part 1 - Theory

    The Ultimate Port Scanning Guide: Part 1 - Theory

    This is a multi-part blog post about port scanning. In this post we're going to cover port scan theory. In the next post in this series we'll look at the practical parts of port scanning. It might seem a little dry in places, but stick with it as it's knowledge you're almost certainly going to be tested on in any professional exam. If it's not in your exam, you're in the wrong class.

    Read more

    A Guide To Recognising Backdoors using Metasploitable 2

    A Guide To Recognising Backdoors using Metasploitable 2

    Every now and again when pentesting you come across something that doesn't quite seem right. You can't always put your finger on it, it's just a little... off. Whether it's a code execution bug that's a little too easy to exploit, or the demo user account that looks like someone forgot to remove, sometimes vulnerabilities just seem as though they were deliberately placed there, even if it's for legitimate purposes. These bugs are commonly known as backdoors, and in this post I'll go through the steps in detecting some common types of backdoor from the network.

    Read more

    ICMP and IP Network Mapping Tricks Every Pentester Needs To Know

    ICMP and IP Network Mapping Tricks Every Pentester Needs To Know
    Beyond the basics, there are various little things pentesters need know about when it comes to network mapping. It's quite surprising how many people get these things wrong, until you actually look at the RFCs behind them. The tricks I'm going to show you are actually based mostly on implementation gaps, and as such it's not surprising that people get them wrong (I know I sometimes do), but keep this post handy as a reference and you'll be able to learn from my mistakes.

    Read more

    The Best Laid Career Plans of Mice and Pentesters

    The Best Laid Career Plans of Mice and Pentesters

    At the inaugural 44CON Cybersecurity I conducted a workshop on career planning. Career planning is something people tend to do at school, college or university but rarely as adults. Many people experience career planning through a disinterested and irrelevant prism, so it's not surprising they find it dull.

    Read more

    No infosec experience? No problem!

    No infosec experience? No problem!
    A lot of people ask me about how they can get into the wider information security industry from outside, be that as a student or as someone looking to change careers. The first thing I ask them is, "What infosec experience do you have?" Inevitably, the answer is almost always the same.

    Read more