by Josh Daniels | Oct 22, 2025 | Artificial Intelligence, Penetration Testing
DeepSeek and You Shall Find: Automating Pentest Reports with AI-Powered Templates for 63 Cents Since the dawn of time, reporting has been the bane of every pentester’s existence. It’s often the most tedious part of the job and is almost always highlighted as something...
by Josh Daniels | Oct 15, 2025 | Artificial Intelligence, Penetration Testing
Credential stuffing remains one of the most efficient paths to account takeover, and AI assistance is changing the economics and effectiveness of those attacks. Below is a practitioner-focused examination of how the classic stuffing workflow works, how AI augments it,...
by Josh Daniels | Oct 1, 2025 | Learning, Penetration Testing
Networking is the foundation of IT. IT is the foundation of Pentesting. If you’re just starting out from a background that didn’t include the fundamentals of networking, you might feel lost and behind when the subject comes up. If offensive cyber security...
by Josh Daniels | Sep 3, 2025 | Career Advice, Penetration Testing
In cybersecurity, we often divide professionals into two camps: Red Teamers (the attackers) and Blue Teamers (the defenders). Red Teams simulate real-world attacks to expose weaknesses, while Blue Teams focus on monitoring, detection, and response. These can seem like...
by Josh Daniels | Aug 27, 2025 | Career Advice, Penetration Testing
The job market in general is tough right now, and cyber security, which is supposed to be a hot field, is flooded with entry-level applicants for what are essentially intermediate-level positions. This may sound a little “doom and gloom,” but if you really want to...
by Josh Daniels | Jul 23, 2025 | Penetration Testing
One of the first technical needs of a pentester at the outset of an engagement is access, and one of the best ways to gain access is through collecting and cracking password hashes of valid user accounts. The complexity of this process can vary depending on factors...