Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

An Introduction to Pentesting and the Pwn Plug

Deathspawner (1037894) writes | about 2 years ago

Security 0

Deathspawner writes "Most sysadmins understand how to set up and maintain a network, but many fall victim to not understanding the concept of auditing — the art of testing your own network in many of the same ways that malicious users could...in effect, hacking your own setup. An article at Techgage takes a look at the basic concepts of pentesting and one of the most simple, feature-rich platforms for it — the Pwn Plug — while discussing why vulnerabilities exist, why and where to begin, and some of the tools that should be in your digital toolbox."
Link to Original Source

cancel ×

0 comments

Sorry! There are no comments related to the filter you selected.

Check for New Comments
Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>