Website:-
(1) Install and configure different services on Servers
(2) Server Security.
(3) Network Security.
(4) Server installation and Management.
(6) RedHat, CentOS, Ubuntu, Debian.
(7)Cisco switchs and Router Configuration.
Hypertext Transfer Protocol (HTTP) is arguably one of the most popular protocols
used today. Web servers have moved from serving static pages to handling complex web applications with actual user interaction. This has opened the doors to tainted user input that could change an application’s logic to perform unintended actions. Modern web development frameworks allow almost anyone with knowledge of programming to produce web applications within minutes, but this has also caused an increase of vulnerable app
Nmap – Gathering Additional Host Information
Pentest Magazine
The most important process during a penetration test is the information gathering phase. During this process we investigate our target with the goal of learning everything about it. The information we discover could be invaluable in further stages of our penetration test. During this process we gather information such as usernames, possible passwords, additional hosts and services, or even version banners, among many other interesting bits of data.
Smartphone PenTest Framework (SPF) Up and Running in Kali Linux
Pentest Magazine
Smartphone Pentest Framework is a tool for penetration testing the android Smartphone. It’s also may use Iphone and Blackberry developenment. The Smartphone-Pentest-Framework is a tool developed by Georgia Weidman. It is designed to aid in assessing the security posture of Android Smartphone’s in an outer environment.