Find the latest Webinar content from the Sprocket Testing Team.
Resources Blog

Blog

Keep up to date with the latest offensive security news, knowledge, and resources.
What is attack surface management?
Jul 20, 2023

What is attack surface management?

Continuous monitoring of an organization’s attack surface – digital and physical assets that connect to the internet – is possible with attack surface management.
Artificial Intelligence in Cyber Security
Jul 07, 2023

Artificial Intelligence in Cyber Security

AI will almost certainly become a central part of the SOC of the future. However, it’s important to ensure that this AI is well-trained and to address the potential for attacks specifically targeting these AI systems.
Network penetration testing: what is it and why do you need it?
Jun 08, 2023

Network penetration testing: what is it and why do you need it?

How your business will benefit from network penetration testing and why it’s important to conduct annual testing.
What Are Breach and Attack Simulations?
Apr 28, 2023

What Are Breach and Attack Simulations?

Regular BAS exercises can be a valuable tool to improve an organization’s security posture and protect against cyber threats. In the long run, finding and fixing vulnerabilities in an exercise is cheaper and safer than discovering them when an attacker exploits.
Discovering wp-admin.php URLs in Wordpress With GravityForms
Apr 05, 2023

Discovering wp-admin.php URLs in Wordpress With GravityForms

By targeting a specific endpoint and passing in a random string, GravityForms will prompt users to authenticate first. This results in the unauthenticated user being redirected to the obscured administrative login page for /wp-admin.
cURL For The Pentester: Above & Beyond
Mar 03, 2023

cURL For The Pentester: Above & Beyond

Did you know you can interact with LDAP using cURL? How about NTLM, proxy tunneling, or domain sockets? A deep dive into some less common and advanced features of cURL, including sending POST requests with a payload file, uploading files to a server, exploiting Spring4Shell, and exploiting SQL injection vulnerabilities using cURL.