Find the latest Webinar content from the Sprocket Testing Team.
Resources Blog

Blog

Keep up to date with the latest offensive security news, knowledge, and resources.
Why Your Vendors Need to be in Your Testing Scope
Feb 18, 2026

Why Your Vendors Need to be in Your Testing Scope

Your pentest scope might be missing the biggest risk in your environment: your vendors. See the data and what to do about it.
Hunting Secrets in JavaScript at Scale: How a Vite Misconfiguration Lead to Full CI/CD Compromise
Feb 16, 2026

Hunting Secrets in JavaScript at Scale: How a Vite Misconfiguration Lead to Full CI/CD Compromise

Sometimes when conducting a Penetration Testing exercise or Red Team engagement, you might be interested in extracting password hashes or credentials of your target Windows user, without the use of Mimikatz to avoid detection. This is where you would resort to using an NTLM downgrade attack. In this article we shall discuss how you can be able to perform this...
Why Dwell Time is the Ransomware Variable That Matters Most
Feb 13, 2026

Why Dwell Time is the Ransomware Variable That Matters Most

Ransomware dwell time averages 16 days. Learn why the time attackers spend inside your network, not the breach itself, determines your blast radius and recovery cost.
Ahead of the Breach – Matthew Winters on Threat Hunting, Graph Thinking, and Making Adversaries Cry
Feb 11, 2026

Ahead of the Breach – Matthew Winters on Threat Hunting, Graph Thinking, and Making Adversaries Cry

Matthew Winters of T. Rowe Price joins the pod to discuss how graph thinking changes the way you can investigate threats, mixed in with a nice dose of making life harder for attackers.
How Continuous Penetration Testing Keeps You Audit-Ready
Feb 09, 2026

How Continuous Penetration Testing Keeps You Audit-Ready

Annual pen tests leave 345 days of untested exposure. Learn how continuous penetration testing keeps your security posture audit-ready year-round.
The Dangers of Public Registration in Web Apps: How a JWT + oData Leaked Millions of Records
Feb 06, 2026

The Dangers of Public Registration in Web Apps: How a JWT + oData Leaked Millions of Records

Nick Aures guides us through a real-life pentesting moment with important lessons for authentication using industry-standard technology, in this case JWTs.
4 5 6 7 8