This article is written by Robert W. Beggs, the author of Mastering Kali Linux for Advanced Penetration Testing. This article focuses on how Veil-Evasion enhances the ability to bypass antivirus detection.Read Veil-Evasion in full
This article is written by Kevin Cardwell, the author of the Building Virtual Pentesting Labs for Advanced Penetration Testing book. This article is about using the client as a pivot point.
When we compromise a machine, the next thing we want to do is use the client source to our advantage. This is because we know most networks are configured with the locations that are inside the network architecture being considered at a higher level of trust and not with a location that is outside the network. We refer to this as pivoting.
(For more resources related to this topic, see here.)Read Using the client as a pivot point in full
The article by Vitor Subtil, the author of Near Field Communication with Android Cookbook, explains that the NFC Forum is responsible for developing standards-based NFC specifications to allow interoperability between different devices and tags. One of the specifications created by the NFC Forum is NFC Data Exchange Format (NDEF). The NDEF specification defines the message encapsulation format to exchange information between two NFC-enabled devices or devices with the NFC tag. NDEF is a lightweight, binary message format that can be used to encapsulate several custom payloads. Using this abstraction layer allows us to create the standard tag content compatible with all the NFC Forum tag types, ignoring the fact that each tag type has different hardware setups and memory layouts.
In this article, we will cover the following topics:
- Working with the NDEF record
- Writing a URI-formatted record
- Writing a text-formatted record
- Using Android Application Record
- Working with external types
In this article by Ivan Idris, author of Learning NumPy Array, we will learn about some signal-processing techniques, and we will analyze time-series data with these. As example data, we will use the sunspot data provided by a Belgian scientific institute. We can download this data from several places on the Internet, and it is also provided as sample data by the statsmodels library. There are a number of things we can do with the data, such as:
Trying to determine periodic cycles within the data. This can be done, but this is a bit advanced, so we will just get you started.
Smoothing the data to filter out noise.
This article is written by Ciro Cardoso, the author of Lumion 3D Cookbook. With this article, we will deliver the best of what Lumion has to offer and how to use Lumion's intuitive and powerful tools for bringing your visions to life. While reading this article, you will be taken through a wide variety of topics that will help you improve your workflow and your project's quality. You will start with some basic notions that will ensure that you start a project with the right foot. You will find that Lumion will not only help you set up a solid and well-organized project, but also increase the quality and detail of the still image or movie that you'll produce.Read Unleashing the powers of Lumion in full