Our Blog
Resources and insights
The latest industry news, interviews, technologies, and resources.
Four Must-Haves for Effective Penetration Testing
The true value of a pentest lies in the actionable insights and collaboration with your pentest team. Here are four critical elements you should never skip.
Getting Started with Kali Linux: Installation Guide and Tips for Beginners
Kali Linux is an essential tool for ethical hackers! Learn how to install it and PimpMyKali and get started with our tips for beginners.
Intro To Car Hacking: Replay Attacks
Learn how to build an inexpensive mock keyless entry system and Raspberry Pi replay attack device to simulate modern car hacking without breaking the law.
Bypassing Defender the Easy Way – Fodhelper
If you’ve ever tried to run a command prompt as administrator on your Windows OS before, you’ve seen a harmless popup appear. This is Windows User Account Control, or UAC. According to Microsoft, UAC “is a fundamental component of Microsoft’s overall security vision....
Pentest Tales #002: Digging Deep
Welcome to the second edition of Pentest Tales, a blog series that walks through real-world pentests we’ve performed in the past.
SMB Relay Attacks – Gift That Keeps on Giving
Trendy vulnerabilities like PrinterNightmare and attacking Active Directory Certificate Services may seem incredible currently (and they are), but they end up being manually patched out and dealt with over time. Systems administrators will consider their risk and...
Kerberoasting Domain Accounts
The Gift That Keeps on Giving Few vulnerabilities in the Windows Active Directory environment have had the long-lasting impact that Service Principal Names (SPN) have. Domain-connected services, such as MSSQL servers, web servers, and more may be connected and issued...
ASREP Roasting & Pre-Authentication in AD Environments
Any Systems Administrator knows that the task of securing an Active Directory environment is a never-ending task. Since the first Windows AD was released with Server 2000, Microsoft has added countless features. Many of these features are created with connectivity in...
Boost Your Security Program for WFH Employees
With communities beginning to open back up, companies are considering the decision to stay remote. And this comes with good reasons. The cost of leasing space might be prohibitive and downsizing to host only necessary business functions could help with expenses....
Stay Ahead of Cyber Threats
Get expert insights on the latest penetration testing strategies, emerging vulnerabilities, and cybersecurity best practices—straight to your inbox.
Loading form...
We care about your data in our privacy policy.








