Find the latest Webinar content from the Sprocket Testing Team.
Resources Blog

Blog

Keep up to date with the latest offensive security news, knowledge, and resources.
Password Spraying Self-Hosted Microsoft Services
Jan 09, 2023

Password Spraying Self-Hosted Microsoft Services

Self-hosted Microsoft services, such as Exchange and Skype for Business, are ideal targets for password spraying attacks. Learn more about how these threats work and how to protect your business.
Fix Cleartext Password Issues in Your Organization
Jul 21, 2021

Fix Cleartext Password Issues in Your Organization

The key to our engagements often and unfortunately involve the discovery of credentials on internal network file shares. We’re going to show you how we find cleartext password storage problems and how to address them.
Fourteen good reasons to require 14-character passwords
Jun 15, 2021

Fourteen good reasons to require 14-character passwords

Password. Password123. Yea, you’ve seen them all when it comes to bad passwords. It comes standard when managing IT security. But while your organization likely requires special characters, uppercase letters and even a number or two, if you don’t require longer passwords you’re not taking one of the most important steps to protect your network.
How to defend against password spraying
Oct 21, 2020

How to defend against password spraying

Given how often we see this tactic used, we’re going to break down the basics. We want to help you understand how password spraying works, along with some effective steps you can take to prevent it from being used against your organization. What is password spraying?
Multi-Factor Authentication: How Attackers Still Exploit It
Aug 21, 2020

Multi-Factor Authentication: How Attackers Still Exploit It

Over the past years, we’ve urged companies to start using Multi-factor authentication (MFA) – and many have followed through. Unfortunately, we have a long way to go. First, the good news. MFA protects by adding a layer of security using an out-of-band authentication step, making it harder for attackers to gain access to an organization. Not to mention, it keeps security...
2 3 4 5 6