So, why learn penetration testing / ethical hacking / hacking or whatever they want to call it anyway? Because technology is touching every fabric of our lives from hospitals, education and even our personal information; it is important to understand how to not only operate offensively but also operate defensively. These documents will guide you through the process of offensive computing with demonstrated techniques, articles and (possibly) videos on how to secure your data, systems and infrastructure.
Whether you are attempting to protect data that is valuable to you, your company or infrastructure -- or you simply want to understand the security of the digital landscape better. You can find resources here!
We have put together various articles with *hands-on methods of bending the rules of security to fit the needs of a penetration tester, or hacker. These materials describe scanning, exploitation, web application hacking and other methods to procure access to a remote and or end-point. Each segment accompanies it's respective counter-measure and examples of how and why the method operates and or, works.