Nmap is one of the best network mapping tools out there. This guide will explain how to use Nmap to identify machines and services available in a network. What is Nmap? Nmap is a free and open-source tool that can be used by network and system administrators and...
Learn the basics of Linux with North Green. This free, beginner-friendly, video-based course introduces essential commands, tools, and tips to help you navigate, manage systems, and effectively use Linux. Practical experience is key to mastering Linux, and we’ve got...
Password cracking is an essential skill for penetration testers. Whether it is being used to crack a hash you’ve got from using responder, gain a first foothold on a device, or attempting to compromise accounts for lateral movement through a network, it is an...
JSON Web Tokens – or JWTs – are a common method of providing authentication and authorisation to a web application. While they may seem complex, it is possible to look closely and break down the structure of these three-part tokens, to understand the different...
An A-Z of pentesting terms and abbreviations – Part 2 In this blog post, we continue our A-Z glossary of common pentesting abbreviations, acronyms and terms, from N-Z. Get ready for the likes of OSINT, RFI, YubiKeys and more. And don’t forget, you can catch up...
The tech industry is synonymous with abbreviations, and cyber security is no different. TLAs (three letter abbreviations), acronyms, other abbreviations and unfamiliar names or terms are the norm. As a result, in this blog we have collated an A-Z glossary for the...