External Testing
Resources Blog

External Testing

Keep up to date with the latest offensive security news, knowledge, and resources.
Why Your Vendors Need to be in Your Testing Scope
Feb 18, 2026

Why Your Vendors Need to be in Your Testing Scope

Your pentest scope might be missing the biggest risk in your environment: your vendors. See the data and what to do about it.
Hunting Secrets in JavaScript at Scale: How a Vite Misconfiguration Lead to Full CI/CD Compromise
Feb 16, 2026

Hunting Secrets in JavaScript at Scale: How a Vite Misconfiguration Lead to Full CI/CD Compromise

Sometimes when conducting a Penetration Testing exercise or Red Team engagement, you might be interested in extracting password hashes or credentials of your target Windows user, without the use of Mimikatz to avoid detection. This is where you would resort to using an NTLM downgrade attack. In this article we shall discuss how you can be able to perform this...
How External Pentesting Works and Critical Best Practices
Mar 11, 2025

How External Pentesting Works and Critical Best Practices

External penetration testing simulates cyber-attacks from outside an organization's network perimeter.
Continuous Penetration Testing: Key Benefits and How It Differs from Traditional Methods
Feb 26, 2025

Continuous Penetration Testing: Key Benefits and How It Differs from Traditional Methods

You need more value out of your pentests. The traditional point-in-time testing isn't cutting it. Continuous penetration testing brings an innovative methodology that better protects you and your business. This post covers the key benefits that continuous testing provides...
External Attack Surface Management: 5 Key Capabilities
Nov 14, 2024

External Attack Surface Management: 5 Key Capabilities

External attack surface management (EASM) focuses on managing and securing an organization's digital assets exposed to external threats.
Large Language Model (LLM) Security Testing: Types, Techniques, and Methodology
Oct 01, 2024

Large Language Model (LLM) Security Testing: Types, Techniques, and Methodology

Get ready to learn the importance of LLM (Large Language Model) security testing, a vital process for identifying vulnerabilities in AI models, especially those integrated into web applications. The need for early detection of potential risks like unauthorized data access, prompt injection attacks, and remote code execution is more crucial than ever.
1 2 3 4