Our Best Courses
Who We Are
Pentest Geek is committed to delivering high quality training materials, instructional videos, and mentoring services to ethical hackers of all skill levels. Because of this, our vision is to promote security awareness through penetration testing, adversarial Red Teaming and goal oriented attack simulation. Our team of professional penetration testers are highly skilled and recognizable leaders within the information security and penetration testing industry.
Simply put, Ethical Hacking is a form of information security assurance. Typically, a trained industry professional performs a variety of focused attack simulations. These simulations target various components of the information system. They are highly targeted, and usually modeled after real-world threat scenarios. Ethical hacking can be used to uncover weaknesses in the security posture of a system, organization or entity. As the name suggests, ethical hacking is done “ethically” and without malicious intent. We do not post illegal or otherwise unethical hacking related materials anywhere on Pentest Geek.
Featured Blog Posts
Everything you need to begin installing Kali NetHunter can be purchased on Amazon. The only real requirement is of course a supported Android device however this guide also makes use of the keyboard folio which should be considered a necessity if you plan to do any real work on the tablet as well as an OTG cable for plugging in an external WiFi card.
A really cool CVE for attacking palo alto networks PAN-OS was published near the end of last year CVE-2017-15944. Just last weak Philip Pettersson created a Metasploit Module to take full advantage of this bug and achieve remote code execution! I recently had the pleasure of leveraging this attack vector
If you’re not currently using Phishing Frenzy, BeEF, or PowerSploit for your Phishing campaigns you’re really missing out. In this article we are briefly going to cover what I consider to be one of the “new hotness” attack vectors that every pentester should be using in their next phishing assessment.