Our Blog
Resources and insights
The latest industry news, interviews, technologies, and resources.
Top 5 Tools for Active Directory Penetration Testing
Are you on the road to becoming a penetration tester? Understanding Active Directory and how it is vulnerable to attackers is a crucial skill when it comes to infiltrating corporate networks. In this article, we look at some of our favorite tools for Active Directory...
Protecting Your Network With Honeypots
Set up a honeypot to trap hackers and learn about the tactics, techniques, and procedures they may be using to try and break into an organization’s systems.
Prototype Pollution: Advanced Web Hacking
An outline of the elements of the prototype pollution JavaScript vulnerability, how it functions, how to test for it, and how to exploit it in a pentesting situation.
Technical Notes and Documentation
Understand the key differences between Penetration testing and Red Team engagements to ensure that you choose right course of action for your organization.
Things to Try When your Reverse Shell Fails
Target enumerated, check.Vulnerability identified, check.Tested payload delivery, check.RCE verified, check.Reverse shell...nope. Today we are going to look at some practical ways to troubleshoot your reverse shell. Some of these points come from logical thinking,...
Top Pentest Findings in 2022 from a First Year Pentester
The year 2022 has wrapped up and I find it helpful to share some of the most common findings I have encountered throughout the year. Some of these may not be surprising as they are covered in almost every cybersecurity awareness training course there is. However, it...
So You Want to Be a Hacker: 2023 Edition
Video Version: Introduction The past two years, we've posted blogs on how to become an ethical hacker. Given that these blogs have been well received, we have brought back yet another edition. So, without further ado, let's chat about how you can break into the field...
Linux Isn’t Scary
Learning Linux is essential for aspiring ethical hackers. Start learning the fundamentals today and you will be well on your way to a career in cybersecurity.
Getting Started with Prototype Pollution
Prototype pollution allows an attacker to modify the prototype of an object. This means we can potentially assign new properties or methods to an object. Furthermore, we may be able to overwrite existing properties. If you’re unfamiliar with prototypes and...
Stay Ahead of Cyber Threats
Get expert insights on the latest penetration testing strategies, emerging vulnerabilities, and cybersecurity best practices—straight to your inbox.
Loading form...
We care about your data in our privacy policy.








