by Zach Hill | Jan 28, 2023 | Help, Penetration Testing, Security
One of the most underrated resources in your toolkit as an I.T. Professional is your ability to take notes. Ironically, this is also one of the least mentioned skills discussed when learning the fundamentals of anything new. We often get asked a variety of questions...
by Alex Olsen | Jan 27, 2023 | Help, Learning, Linux, Penetration Testing, Security
Target enumerated, check. Vulnerability identified, check. Tested payload delivery, check. RCE verified, check. Reverse shell…nope. Today we are going to look at some practical ways to troubleshoot your reverse shell. Some of these points come from logical...
by Alex Olsen | Jan 17, 2023 | Penetration Testing, Security
Prototype pollution allows an attacker to modify the prototype of an object. This means we can potentially assign new properties or methods to an object. Furthermore, we may be able to overwrite existing properties. If you’re unfamiliar with prototypes and...
by Zach Hill | Jan 13, 2023 | Help, Penetration Testing, Security
As with any industry, with jargon comes confusion and misunderstanding. 2022 saw a huge rise in the popularity of the buzz-word “Red Team”, but what is the essence of a Red Team? Popular opinion on social media may say “it’s a pentest with no scope,” but that’s a...
by Steven Amador | Nov 14, 2022 | Security
MFA stands for Multi-Factor Authentication. Microsoft helps clarify MFA as an additional step in the authentication process, “You need a second thing – what we call a second “factor” – to prove who you are.” When logging into your...
by Steven Amador | Nov 8, 2022 | Penetration Testing, Security
Our last blog post regarding OSINT and Recon briefly discussed some exciting topics. In this blog post, we will continue with that thread and discuss some tradecrafts used by investigators and Pentesters. Only some investigators and pentesters utilize these exact...