LLMNR Poisoning and How to Prevent It in Active Directory

LLMNR Poisoning and How to Prevent It in Active Directory

0. Overview Active Directory (AD) stands as a foundational piece for many organizational networks, streamlining administrative tasks and enhancing productivity. However, out of the box, AD comes bundled with various features and default settings that can be exploited...
SMB Relay Attacks and How to Prevent Them in Active Directory

SMB Relay Attacks and How to Prevent Them in Active Directory

0. Overview Many organizational networks rely on Active Directory (AD) to streamline administrative tasks and enhance efficiency. However, some of its default configurations are vulnerable to attackers. The SMB (Server Message Block) protocols stand out as...
Should a Company Provide Credentials for Their Penetration Test?

Should a Company Provide Credentials for Their Penetration Test?

On occasion, we get clients who are concerned about some of the stereotypes that they may read about or hear when it comes to a penetration test. While a penetration test may be us attacking your infrastructure, we are not your adversaries. Your company made the...
Penetration Testing – From Adversary to Partner

Penetration Testing – From Adversary to Partner

While penetration testing can be considered “adversarial” testing, it should be anything but that. Your penetration test, no matter who you do it with, should be a partnership. In every partnership, communication is key. Settling for a pentest company that merely...
Security Testing Requirements for PCI-DSS

Security Testing Requirements for PCI-DSS

Overview Organizations handling credit card data must adhere to the Payment Card Industry Data Security Standard (PCI DSS). Understanding the specifications and what an organization must do specifically to comply with the standard can be challenging. This article will...