When we launch continuous penetration testing in a new network, we don't want to raise suspicion of our presence.
For one reason, we may be able to get credentials without doing anything intrusive at all.
To do it, we use packet captures and some external tooling. Below, we’ll break down how to do it, along with a few of our favorite...
Resources
Blog
Nicholas Anastasi
Blogs by Nicholas Anastasi
Over the past years, we’ve urged companies to start using Multi-factor authentication (MFA) – and many have followed through. Unfortunately, we have a long way to go.
First, the good news. MFA protects by adding a layer of security using an out-of-band authentication step, making it harder for attackers to gain access to an organization. Not to mention, it keeps security...
There are cybersecurity phishing streams & threats constantly growing and evolving. Email spam is no longer the front line of the battlefield. Here are 3 new phishing streams beyond email - and how to safeguard them.
In this article I show you how to create small containers that use up to date tools. By default, the Golang Docker container at its smallest is 123 MB. While seemingly small, this can result in annoying latency and slowness when deploying new tooling at scale...