Monday, December 25, 2017

A Day In The Life Of A PenTester (Ethical Hacker)!

There is demand for experienced IT Security Professionals, (one million in fact); especially folk that can defend networks and keep prying eyes away from sensitive data. Key to the demand are Cyber Security Professionals that have the actual skills to defend (Blue Team) or attack/ offensive (Red Team); and typically we think about Penetration Testers when this subject come up.

Sunday, October 1, 2017

SpeedTouch Team Writeups for DefCamp CTF 2017

DefCamp is the most important conference on Hacking & Information Security in Central Eastern Europe. The goal is bringing hands-on talks about latest research and practices from the INFOSEC field, gathering under the same roof security specialists, entrepreneurs, academic, private and public sectors.

Wednesday, September 13, 2017

Difference Between White Hat, Gray Hat and a Black Hat Hacker

Today we gonna talk about the difference between a Black Hat, White Hat & Gray Hat Hacker: The word Hacker doesn’t intend to be a bad person in the computer world, much less a virtual “criminal” or “bandit”. Tech writers often point to Hackers breaking them into three categories: Black Hat, White Hat and finally Gray Hat. These terms represent different groups of hackers based on their role towards the connected world.
The definition of the word “Hacker” mean someone who compromises computer security or even a developer practicing open source development or something from that kind.

Monday, September 4, 2017

Can We Use Kali Linux for Regular Daily Use ?

Penetration Testers, Cyber Security Researchers, IT Security Consultants, Script Kiddies most of them use Kali Linux and more. Kali Linux is a Debian-Based Special Made Distribution by Offensive Security for Penetration Testing Purpose.

Friday, August 25, 2017

Cyber Security - Capture The Flag (CTF)

Cyber Security is a high priority of companies & governments. Cyber Attacks & Breaches have been on the rise in the last years. By that Security Professionals have been through rigorous training as how HACKERS are able to get into companies & govs infrastructures and how to defend against them.

ExploitPack - Penetration Testing Framework v8.0

Exploit Pack is a security tool that targets Penetration Testers/Ethical Hackers. It is Open Source and licensed under the GPLv3. Basically it means that its free to use and a non-commercial tool. Using this Pack you can be sure that on your next PenTest you will become unstoppable. The good thing about this toolkit is that it's supported by all operating systems, including: Windows, Linux, Unix, Minix, SCO, Solaris, OSX, etc. and even mobile and web platforms.

Thursday, August 24, 2017

Guide To Cyber Security Certifications

A degree will only take you so far up the job ladder. At some point in your career, an IT Security certification from a reputable third-party organization is necessary. Security certifications give the student a very big knowledge in Hacking & Security alongside more skills and information about different stuff like Networking & Programming.

Wednesday, August 23, 2017

Security Architect vs Security Consultant vs Penetration Tester !


Architect thinks first and foremost conceptually. They focus on business requirements and how to align security to meet those objectives. This typically manifests in changes to IT (infrastructure, applications) but can just as easily be a process change if it is the simplest solution. Architects are able to dive town in depth on a technical level but generally speaking, not to the same degree as the other two.


Is the middle man between an architect and pentester. A consultant thinks in terms of risk. Usually a technical person who has moved into to consulting based on broader exposure to other areas of security or business and/or excellent communication skills to be able to articulate risk and translate architectural terms and concepts or low levels of detail that a penetration tester may unravel. The posess a moderate degree of technical skill generally, typically higher than an architect.


Highest degree of technical skill. Engineers often fall within this category too. They possess the deepest degree of knowledge and in many cases, the broadest. Their ability to focus on the microlevel of detail is the single greatest strength and in many cases their weakness.


In my mind there is no one better than one, because everyone have his/her own job and rules and obligations. Security Architect thinks about the Business in a manner of Security. Security Consultant valuates the network or the security of something. The Penetration Tester is the responsible of hacking and getting access into systems in order to prove something that maybe already got by a consultant!

In a clear understanding the PenTester is the HACKER. So for me i prefer a Penetration Tester over all others! But it depends on a lot of situations like the salary, the work, and more.

Let me see what do you think in comments :-) !