About Pentest Geek
Welcome to pentestgeek.com! we hope you’ll enjoy our collection of stories from real penetration testers. Our authors are ethical hacking experts who share their experiences testing the integrity, confidentiality and availability of the toughest networks out there.
What Is Ethical Hacking
Ethical hacking is a form of information security assurance. Typically, a trained industry professional performs a variety of focused attack simulations. These simulations target various components of the information system. They are highly targeted, and usually modeled after real-world threat scenarios. Ethical hacking can be used to uncover weaknesses in the security posture of a system, organization or entity. As the name suggests, ethical hacking is done “ethically” and without malicious intent. We do not post illegal or otherwise unethical hacking related materials anywhere on Pentest Geek.
Ethical Hacking Experts:
zeknox – Brandon McCann is a Principal Security Consultant with Accuvant LABS’ Enterprise Security practice with over 7 years of experience in the Information Technology industry. Brandon specializes in network penetration testing, antivirus avoidance and web application testing. Prior to joining Accuvant, Brandon was a Senior Security Consultant in the Information Security Services Group at CliftonLarsonAllen and performed network penetration testing, web application testing, digital forensics, high termination lockouts, and social engineering assessments. Brandon is an active part of the metasploit project and very active in the security community. Brandon is also certified as an Offensive Security Certified Professional (OSCP), Cisco Certified Entry Networking Technician (CCENT), GIAC Certified Forensic Analyst (GCFA), Microsoft Certified Professional (MCP). Brandon holds a Bachelor’s degree in Accounting from St. Cloud State University with a minor in Business Computer Information Systems.
r3dy – Royce Davis is a security expert specializing in network and application penetration testing. He is highly recognizable throughout the security industry as a thought leader, open source software contributor, author and public speaker. Royce’s primary focus is to train and develop ethical hacking professionals. In addition to staying current with the latest and deadliest ethical hacking trends. Royce brings a very broad range of ethical hacking skills to his team including:
- Obfuscation of malicious software code
- Network protocol fuzzing
- Web application penetration testing
- Exploit research & development
- Pentest automation
Royce has an Associate of Applied Science degree in Information Systems Management from Dakota County Technical College. Royce is certified as a GIAC Certified Web App Penetration Tester (GWAPT), an Offensive Security Certified Professional (OSCP), an Offensive Security Certified Expert (OSCE), and has been accepted into the SANS mentor program for his outstanding performance as a student of the SEC542 “Web App Pentesting & Ethical Hacking” Course.
SmilingRaccoon – Thomas McCarthy is an Information Security consulting with three years of experience in the Information Security field. Thomas spent two years as an information security engineer, focusing on defensive security and has since switched to a focus on network penetration testing and vulnerability assessments. Thomas is a community contributor to Metasploit and has committed several modules to the framework. Thomas has two Bachelors in Applied Networking and System and Administration & Information Security and Forensics from Rochester Institute of Technology. Thomas is an Offensive Security Certified Professional (OSCP), GIAC Certified Intrusion Analyst (GICA), GIAC Certified Penetration Tester (GPEN), and associate CISSP.
Subscribe to Pentest Geek
Follow Pentest Geek
- How To Install Metasploit Framework Ubuntu 14.04
- How to Install Nmap From Source
- Another Lap Around Microsoft LAPS
- Credential Harvesting via MiTM – Burp Suite Tutorial
- SSL Certificate from letsencrypt.org – Setup Guide
- Forensics and Incident Response
- Information Gathering
- Penetration Testing Tutorials
- Web Applications