Glossary
Open-source software projects are, in theory, more secure than closed-source/proprietary software due to the clear disclosure of security vulnerabilities and the potential for source code review.
Is Open Source or Proprietary More Secure?
Open-source software projects are, in theory, more secure than closed-source/proprietary software due to the clear disclosure of security vulnerabilities and…
Why is Python Used for Hacking?
Python is well-known as a fast, simple and easy, readable scripting or programming language. Those features make Python one of…
What is a Physical Penetration Test?
A physical penetration test (pen test) is where an ethical hacker or social engineer will try to gain entry to…
What is Cloud Pentesting?
Cloud Penetration Testing or 'Pentesting' typically refers to the testing of a Cloud-hosted environment such as against Amazon Web Services…
What is an Android Pentest?
Penetration testing an Android application involves both the application operation, similar to how a web application test is performed through…
What is PCI Pen Testing?
Payment Card Industry (PCI) Penetration Testing or more commonly shortened to PCI Pen Testing is running penetration tests for the…
What is an OSCP Penetration Test?
An OSCP Penetration Test or OSCP Pentest typically means that a Penetration Test is carried out by someone who has…
What is Nmap in Cyber Security?
Nmap is a port scanning tool used by penetration testers and hackers to identify exposed services.
Internal vs External Pen Testing
The aim of the pen test is to identify weaknesses and flaws within the infrastructure’s attack surface and leverage them…