#SecurityTesting

2026-02-01

🔎 Một kỹ sư backend muốn thực hành phân tích bảo mật ứng dụng (web/mobile) miễn phí! 🎯 Cần 2‑3 dự án có môi trường test, không phải production. Ưu tiên phương pháp black‑box, cung cấp báo cáo rủi ro chi tiết, sau đó xoá mọi dữ liệu. DM nếu quan tâm! #cybersecurity #pentest #securitytesting #bảo_mật #kiểm_thử #ứng_dụng

reddit.com/r/SaaS/comments/1qt

2026-01-14

www.ditig.com/lynis-cheat-... - Lynis cheat sheet This cheat sheet provides security teams and sysadmins with a quick-reference guide to Lynis commands, audit options, and configuration details. #securityaudit #systemsecurity #linux #macOS #unix #cheatsheet #securitytesting #cheat-sheet

Preview image of Lynis cheat sheet
Preferably_UsedStormBringer69
2026-01-09

Security Testing is one aspect of modern QA.
There is no way around it, and you should never try to circumvent that fact in any case or with any "trick" you might come up with.

And it is extremely simple and not even costly to integrate as I talked about so much in the past.

Even if you might be tired of hearing it:

Security Testing is crucial today, tomorrow and in the years to come !!!

Pen Test PartnersPTP@infosec.exchange
2025-11-27

Android app testers and security engineers spend a lot of time dealing with Activities. The attack surface may look small, but a poorly configured Activities can expose data or let other apps do things they shouldn't. In this blog post, David Lodge explains how exported and debug Activities, weak WebView settings, and missing window security flags can pose security concerns.

📌 pentestpartners.com/security-b

#androidsecurity #cybersecurity #appsec #mobile #pentesting #infosec #securitytesting

ECS Infotech Pvt. Ltd.ecsinfotech
2025-11-14

Comprehensive Guide to VAPT Services in India: Why Expert Consulting and Auditing Matter

Discover top VAPT Services in India with expert consulting and auditing. Ensure your business’s cybersecurity through comprehensive vulnerability testing.

🔗 Check out our comprehensive guide! - ecsinfotech.com/comprehensive-

Comprehensive Guide to VAPT Services in India: Why Expert Consulting and Auditing Matter
2025-11-06

How Bug Bounty Programs are Improving Software Security
This article demonstrates the tangible impact of bug bounty programs on enterprise security through a real-world case study. **Case Study**: A 19-year-old Brazilian computer science student discovered a critical payment system vulnerability allowing unlimited fund transfers between accounts, which had been missed by senior engineers for months. The student earned a $5,000 bounty and provided valuable security insights. **The Power of Diversity**: While the internal security team consisted of 6 engineers, the bug bounty program provided access to thousands of global researchers with diverse perspectives, unique testing methodologies, and persistent curiosity that no single internal team could match. **Cost-Effectiveness**: Traditional penetration testing costs $25,000 for one-time assessments, while their bug bounty program spent $48,000 over two years but prevented potential losses in the millions of dollars. **Global Army of Ethical Hackers**: Bug bounty programs create a distributed network of ethical hackers who continuously probe systems, providing ongoing security testing rather than one-time assessments. **Business Impact**: This approach allowed the company to prevent massive financial losses while building relationships with the security research community and improving their overall security posture. The article highlights how crowdsourced security testing can outperform traditional methods both in effectiveness and cost efficiency. #infosec #BugBounty #Cybersecurity #ResponsibleDisclosure #SecurityTesting
osintteam.blog/how-bug-bounty-

2025-10-31

The Ultimate Bug Hunter's Recon workflow: From Subdomains to Critical Vulnerabilities
This article presents a comprehensive, methodical reconnaissance methodology for bug bounty hunting that systematically discovers vulnerabilities through a 24-step automated pipeline. The workflow combines multiple reconnaissance tools (ffuf, httpx, dnsx, naabu, nuclei, gau, waybackurls, dalfox, and custom scripts) to identify attack surfaces across subdomains, ports, technologies, and endpoint discovery. The methodology follows a structured approach: initial scoping and subdomain enumeration → DNS and alive host enrichment → port/service enumeration → vulnerability scanning with Nuclei → sensitive file discovery → network reconnaissance (certificates, PTR records) → URL extraction and crawling → XSS and SQL injection testing → log file analysis → JavaScript analysis for secrets → and manual triage. The workflow is designed to be repeatable, instrumented, and automated through shell one-liners and scripts, allowing hunters to process large scope targets efficiently. Key innovations include multi-tool chaining, rate limiting strategies, output deduplication using `anew`, and comprehensive coverage of common vulnerability classes (XSS, SQLi, SSRF, Open Redirect, LFI, IDOR). The methodology emphasizes responsible testing practices, proper authorization, and systematic documentation of findings through intermediate file outputs. Impact includes systematic discovery of forgotten assets, misconfigured endpoints, exposed secrets, and various security vulnerabilities across the target attack surface. The article provides practical command sequences, tool configurations, and tips for avoiding common pitfalls in large-scale reconnaissance operations #infosec #BugBounty #Reconnaissance #Automation #SecurityTesting #VulnerabilityDiscovery
medium.com/@manojxshrestha/the

2025-10-11

Xfence ra mắt cộng đồng các chuyên gia bảo mật uy tín, cung cấp dịch vụ kiểm thử an ninh liên tục. Họ sẽ tìm kiếm và báo cáo các lỗ hổng một cách có đạo đức, giúp bảo vệ nền tảng của bạn 24/7.
#SecurityTesting #Crowdsource #Cybersecurity #Vulnerability #InfoSec #BảoMật #KiểmThửAnNinh #AnToànThôngTin #ChuyênGiaBảoMật

reddit.com/r/SaaS/comments/1o4

2025-10-11

Một nền tảng mới ra mắt cho phép kiểm thử bảo mật liên tục bằng cách huy động cộng đồng chuyên gia. Các nhà nghiên cứu bảo mật sẽ liên tục tìm kiếm và báo cáo các lỗ hổng một cách có đạo đức, giúp doanh nghiệp bảo vệ hệ thống.
#BảoMật #KiểmThửBảoMật #AnNinhMạng #Crowdsource #Cybersecurity #SecurityTesting #Vulnerability #InfoSec

reddit.com/r/SaaS/comments/1o4

2025-09-29

🚀 Beginner’s Guide to Penetration Testing — Start Your Ethical Hacking Journey

Learn the five core phases of a pentest (recon → scanning → gaining access → post-exploitation → reporting), the essential tools you’ll use, and the ethical mindset to practice safely and legally. Perfect for beginners who want a practical, hands-on path into cybersecurity. 🛡️🧭

#penetrationtesting #ethicalhacking #cybersecurity #Infosec #pentest #BeginnerGuide #KaliLinux #Nmap #Metasploit #HackingTools #SecurityTesting #WhiteHat #AxximumInfoSolutions

ECS Infotech Pvt. Ltd.ecsinfotech
2025-09-22

VAPT Services Explained: A Complete Guide to Vulnerability Assessment and Penetration Testing for Stronger Cybersecurity

Learn how Vulnerability Assessment & Penetration Testing protect your systems, detect risks & strengthen cybersecurity defenses.

👉 Read the full guide now! - medium.com/@ecsinfotech/vapt-s

VAPT Services Explained: A Complete Guide to Vulnerability Assessment and Penetration Testing for Stronger Cybersecurity
Credence Research Europe LTDcredenceresearch
2025-08-28

Market growth alert: Security Testing will double in value by 2032.

From USD 2,495.5M (2024) ➝ USD 4,722.6M (2032), CAGR 8.3%.

Rising threats & compliance drive demand.

👉 Full details in report: credenceresearch.com/report/se

Security Testing Market
danielbrown78Lucy4685
2025-07-29

blackhattool.com/icg-auto-expl
The cybersecurity landscape is in a state of constant evolution, with threat actors continuously developing increasingly sophisticated tools and techniques to identify and exploit vulnerabilities in systems, networks, and applications.ICG Auto Exploiter Bot 2025—a powerful and fully automated exploitation framework engineered to streamline the process of discovering and weaponizing security flaws with minimal human involvement.
,,

2025-07-24

Ingin sistem keamanan datamu lebih kuat? 🔐 Yuk, kenali istilah security testing yang diterapkan dalam ISO 27001 untuk perlindungan maksimal!

Klik situs kami dan temukan solusi keamanan informasi terbaik!

🛡️📊
jasaiso.id/ketahui-istilah-sec

2025-05-20

24 Essential Penetration Testing Tools Every Ethical Hacker Should Know 🛠️🔍

Whether you're just starting out or building a full red team toolkit, these tools cover all the key stages of a penetration test — from recon to reporting.

📋 5 Infographics:

🧭 Reconnaissance & Info Gathering
💣 Exploitation & Post-Exploitation
🔐 Credential Attacks & Wireless Testing
🌐 Web App Testing & Shells
🧪 Vulnerability Scanning & Enumeration
🔍 Reverse Engineering & Analysis

Disclaimer: This content is intended for educational and ethical use only. Always perform testing in lab environments or with explicit permission.

#EthicalHacking #PenetrationTesting #CyberSecurity #InfoSec #RedTeamTools #EducationOnly #SecurityTesting #HackTheRightWay

2025-05-08

Dive into our new technical blog, No Exploits Needed: Using Cisco’s Own Features to Extract Credentials, for a behind-the-scenes look at how default settings can lead to a data breach.

In this post, Penetration Testing Team Manager @tompohl shares how he extracted a Cisco router’s entire running configuration—no credentials required—during a recent penetration test and offers tips for hardening your security. lmgsecurity.com/no-exploits-ne

#Cybersecurity #PenetrationTesting #Pentest #IT #CISO #DFIR #Infosec #ITsecurity #NetworkSecurity #Cisco #SecurityTesting

Lisi Hockelisihocke
2025-05-05

The program is out now! Super excited to have been invited to curate this year's track along with Kristof Van Kriekingen and Santhosh Tuppad. 🤩

agiletestingdays.com/program/d

Looking forward to learning with the track's amazing speakers, and Santhosh joining me on my workshop "Secure Development Lifecycle Applied - How to Make Things a Bit More Secure than Yesterday Every Day". 🛡

See you in November to dive into all things together! 🤿

Legacy security testing leaves mobile apps vulnerable to third-party risks. Without deeper binary analysis, attackers can exploit blind spots in the software supply chain. jpmellojr.blogspot.com/2025/05 #AppSec #MobileSecurity #BinaryAnalysis #SecurityTesting

Ionut Balosinionutbalosin
2025-03-26

🚀 New article: Boost your security skills with my latest guide on essential
Explore SCA, SAST, DAST, and PenTest to protect your projects from vulnerabilities. 

ionutbalosin.com/2025/03/secur

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst