We are a team of Anmar Hani and Fawaz Khosifan. We like to write articles about Software Engineering and Security.
Overview While the initial stages of a penetration test focus on gaining access to a target system, the post-exploitation phase is equally critical....
Overview The exploitation phase is the phase where the tester tries to gain access to the system using the vulnerabilities identified in the previous...
Overview Vulnerability scanning is a critical phase in the penetration testing process, where the primary goal is to identify potential...
Overview Information gathering is a critical phase of the penetration testing process, where the primary goal is to collect as much data as possible...
Overview Penetration testing, also known as pen testing, is a process of testing computer systems, networks, or web applications to identify...