Reading Club, Penetration Testing Cheat Sheet — Tentamen Software Testing Blog

Image by from


In this week’s reading club, we share .

Penetration Testing

With penetration testing, we try to find a misconfiguration on the Linux machine. One penetration attack scenario could be to ssh into the Linux machine and then able to see all network traffic to find out a user’s Facebook cookie.

Originally published at on August 23, 2020.




Founder of Tentamen, software testing agency.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

We are glad to announce that METROFinance has been officially audited, kindly find the below link…

InfoSecSherpa’s News Roundup for Monday, June 20, 2022

Cheeseburger. Image by Shutterbug75 from Pixabay.

Protect Your Company Against “Notification” Phishing Schemes

Five Tips On How to Keep Your Cryptocurrency Savings Safe

How to Get Kim Dotcom to Want to Work With You — Kee From Oxen on Building Session And Lokinet

Personal Maintenance in the 21st Century: Floss, Wear Sunscreen, Review Privacy Settings

How to Solve — This Site May Be Hacked Warning

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Karlo Smid

Karlo Smid

Founder of Tentamen, software testing agency.

More from Medium

My experience with the ambient sound mixer

Internship at LetsGrowMore

Phase 1 Project

Let’s Grow More Virtual Internship