Blog

Pentest Tales #001: You Spent How Much on Security?

Pentest Tales #001: You Spent How Much on Security?

Pentest Tales #001: You Spent How Much on security? Welcome to the first edition of Pentest Tales, a blog series that walks through real-world pentests we’ve performed in the past.  The purpose of this blog is not just to share the “owning” of a domain, but to provide education as to why a domain was

Read More
Buffer Overflows Made Easy

Buffer Overflows Made Easy

For most people breaking into cyber security, buffer overflows can be hard for someone to wrap their mind around. My goal is that by the end of this tutorial, the average reader will have a clearer understanding and less fear of buffer overflows.

Read More
Differences Between a Vulnerability Scan and a Penetration Test

Differences Between a Vulnerability Scan and a Penetration Test

Two of the most common questions clients ask are: What’s the difference between a vulnerability scan and penetration test and what option is best for my company? The differences between a vulnerability scan and penetration test are often confused. Let’s take a look at the key differences between the two options and paint a clearer picture on what option you should choose for your company.

Read More