Welcome to My New Information Security Blog
Disclaimer: This would be a long post (culmination of many old posts) with lot of different opinions, thoughts. If weaving is not right, please provide feedback on how it could be corrected. I had the good fortune of reading couple of threads by gentlemen whom I respect for their grounded advices. Their posts triggered some … Continue reading Do not kill your pentester for little or no value-add
Photo by Sean Musil on Unsplash This is a live post; it will undergo changes, which are captured in change log, provided at the end of this post. Being part of many external VAPT engagements, one thing was clear from outset — methodology is the key, but so are the information sources & tools for conducting the VAPT. … Continue reading External Network VAPT: tools, information sources
Follow My Blog
Get new content delivered directly to your inbox.