After Metasploitable in the Cloud [/2014/04/02/metasploitable-in-the-cloud] and
bWAPP [http://blog.ctf365.com/bwapp-in-the-cloud/], CTF365 has increase both,
the number of "vulnerable by design" servers and operating systems by adding
HacmeBank and HacmeCasino as vulnerable web applications courtesy to McAfee
The machines runs on Windows Server 2008 and WindowXP thanks to Microsoft
through their Bizspark Startup Program [http://www.microsoft.com/bizspark/] and
they are acces
This guest blog comes to us from Marius Corici from CTF365 [http://ctf365.com/].
When asked to describe himself he gave me the following: "I enjoy being an
entrepreneur and discovering new solutions for old problems. Motto: Think a lot
to do less and preserve energy to provide simplicity."
There is no doubt that the best way to learn Information Security is hands-on
and to make this easier, the guys from Rapid7 and Metasploit created
When it comes to information security, one of the major problems is setting up
your PenTest Tools Arsenal. The truth is, there are too many tools out there and
it would take forever to try half of them to see if one fits your needs. Over
the years, there have been some well established tools released that most of
security professionals use currently, but that doesn't mean that are not unknown
yet still very good pentesting tools that are not as popular.
I wanted to make a list of the pentest to
By Guest Blogger Marius Corîci, ctf365.com
Before I start, I would like to thank the Metasploit team at Rapid7, and the
Kali Linux team at Offensive-Security for their kindnesses to let us use their
logos on our platform. I'd especially like to thank hdmoore
[https://community.rapid7.com/people/hdmoore] and ckirsch
[https://community.rapid7.com/people/ckirsch] at Rapid7 as well as Mati Aharoni
at Offensive Security. This means a lot to us.
Note: If this article is TL;DR, then I recommend you j