Penetration Testing
Resources Blog

Penetration Testing

Keep up to date with the latest offensive security news, knowledge, and resources.
We Surveyed 200 In-House Pentesters; Here’s a Sample of What We Learned
Oct 15, 2024

We Surveyed 200 In-House Pentesters; Here’s a Sample of What We Learned

We’ve just released our latest report, “Voice of an In-House Pentester,” diving deep into the world of penetration testing. With insights from 200 in-house security practitioners, this report reveals key trends, challenges, and opportunities in the industry.
Red Team vs Blue Team: Roles, Skills, Tools, and Tips
Oct 09, 2024

Red Team vs Blue Team: Roles, Skills, Tools, and Tips

Red and Blue Teams play critical roles in the ever-evolving field of cybersecurity. Red Teams simulate real-world attacks, testing an organization’s defenses by identifying vulnerabilities and potential entry points. Blue Teams, on the other hand, focus on defensive strategies, monitoring systems, detecting threats, and responding to incidents. Together, their collaboration enhances an organization’s ability to detect, prevent, and mitigate cyber...
Website Penetration Testing: Types, Methods, and Best Practices
Sep 19, 2024

Website Penetration Testing: Types, Methods, and Best Practices

Website penetration testing is a simulated cyberattack designed to identify vulnerabilities in a web application. This process replicates the techniques used by real attackers to uncover security gaps. By proactively testing, website owners gain critical insights into potential weaknesses, allowing them to address issues before they’re exploited by malicious actors.
Penetration Testing in 2024: Why, What, and How
Sep 12, 2024

Penetration Testing in 2024: Why, What, and How

Discover how penetration testing identifies security vulnerabilities to protect systems and data from real-world attacks. Learn the key phases and methods.
Forbidden! Are 403 bypasses worth looking for?
Aug 28, 2024

Forbidden! Are 403 bypasses worth looking for?

403 status code bypasses might seem niche and impractical at first glance, but they can be surprisingly valuable for uncovering vulnerabilities at scale. This blog delves into the nuances of 403 bypass techniques, exploring how tools like Nuclei and Burpsuite can be leveraged to identify hidden admin panels and other restricted areas, even when traditional methods fall short.
Recent InfoSec Talks, Defcon 32 - SSHamble: Unexpected Exposures in the Secure Shell
Aug 26, 2024

Recent InfoSec Talks, Defcon 32 - SSHamble: Unexpected Exposures in the Secure Shell

Will Vandevanter discusses a talk he saw at Defcon 2024 that was jam-packed with knowledge, hunting an international criminal, 0 days, and a new open-source tool. Will also talks about some takeaways he got from the talk.
3 4 5 6 7