article thumbnail

What Is Penetration Testing? Complete Guide & Steps

eSecurity Planet

Penetration tests are simulated cyber attacks executed by white hat hackers on systems and networks. There are different types of penetration tests, methodologies and best practices that need to be followed for optimal results, and we’ll cover those here. However, they are also the most realistic tests.

article thumbnail

The Essential Guide to Radio Frequency Penetration Testing

Pen Test

Introduction Radio Frequency (RF) penetration testing, popularly referred to as RF pentesting, stands as a vital domain within ethical hacking. It has significantly impacted various industries, from telecommunications and healthcare to transportation and entertainment. Why is RF Pentesting Necessary?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GTPDOOR: The Shape-Shifting Threat Lurking in Telco Networks

Penetration Testing

A new Linux-based malware, christened GTPDOOR, has emerged with a cunning strategy to infiltrate the heart of telecommunication networks – the GRX (GPRS Roaming Exchange).

article thumbnail

5,000 Businesses Exposed: Critical FreeSWITCH Flaw Urges Immediate Patching

Penetration Testing

In the realm of telecommunication, a new vulnerability, CVE-2023-51443, has emerged, casting a shadow over FreeSWITCH, an open-source communication framework integral to many of the world’s telephony infrastructures.

article thumbnail

Kyivstar Down: Cyberattack Cripples Ukraine’s Largest Telecom Provider

Penetration Testing

Kyivstar, Ukraine’s premier telecommunications operator serving over 25 million mobile and home internet subscribers, has experienced a cyberattack impacting its mobile and internet services.

article thumbnail

Secret Backdoors Found in German-made Auerswald VoIP System

The Hacker News

Multiple backdoors have been discovered during a penetration test in the firmware of a widely used voice over Internet Protocol (VoIP) appliance from Auerswald, a German telecommunications hardware manufacturer, that could be abused to gain full administrative access to the devices.

article thumbnail

Linux Implementation of Cobalt Strike Beacon Targeting Organizations Worldwide

The Hacker News

Researchers on Monday took the wraps off a newly discovered Linux and Windows re-implementation of Cobalt Strike Beacon that's actively set its sights on government, telecommunications, information technology, and financial institutions in the wild.