Penetration Testing – From Adversary to Partner

Penetration Testing – From Adversary to Partner

While penetration testing can be considered “adversarial” testing, it should be anything but that. Your penetration test, no matter who you do it with, should be a partnership. In every partnership, communication is key. Settling for a pentest company that merely...
Getting Started with Offensive JavaScript

Getting Started with Offensive JavaScript

JavaScript is a bit like Marmite, you either love it or hate it. Regardless of how it makes us feel, it is a powerful tool for attacking users and exploitation. Often, popping alert(1) is proof enough to get a fix but doesn’t demonstrate the full impact an attacker...
The Fundamentals of HTTP for Hackers

The Fundamentals of HTTP for Hackers

Hypertext Transfer Protocol (HTTP) is an application layer protocol. On the surface, HTTP can appear quite simple, but there are a lot of quirks considering its use across inconsistent browsers and servers. Check out a video version of this article: Breaking Down An...
What is MFA?  Understanding Multi-Factor Authentication

What is MFA? Understanding Multi-Factor Authentication

MFA stands for Multi-Factor Authentication. Microsoft helps clarify MFA as an additional step in the authentication process, “You need a second thing – what we call a second “factor” – to prove who you are.” When logging into your...