Find the latest Webinar content from the Sprocket Testing Team.

Blog

Stay updated with the latest offensive security news, knowledge, and resources.

Latest Resources

Why no Workstation Needs Inbound SMB
Oct 12, 2022 Sprocket Security

Why no Workstation Needs Inbound SMB

Know the risks and attack vectors associated with allowing inbound SMB port connectivity to workstations with an emphasis on lateral movement tools and techniques. See how Continuous Penetration Testing is highly useful for augmenting the current security control landscape implemented by the business.
Never Stop Frontin’: Redirector and Proxy Setup Made Easy
Sep 09, 2021 Nicholas Anastasi

Never Stop Frontin’: Redirector and Proxy Setup Made Easy

Protecting your infrastructure from prying eyes is an important part of landing a phish and maintaining access to a client’s network. The process of setting up redirectors and reverse proxies has traditionally been difficult and hard to automate across different cloud platforms. Today, we’re going to solve that problem with our new repository, sneaky_proxy, which will allow you to automate your...
Never had a bad day phishing. How to set up GoPhish to evade security controls.
Jun 30, 2021 Nicholas Anastasi

Never had a bad day phishing. How to set up GoPhish to evade security controls.

I’m going to quickly go through the process of setting up GoPhish and show you how we evade defenders to increase the success rate of our phishing campaigns.
Pro tips for purchasing and aging phishing domains
Nov 12, 2020 Nicholas Anastasi

Pro tips for purchasing and aging phishing domains

Good command-and-control infrastructure requires a known, trusted domain. When you’re first starting out, this can be difficult to find, but luckily other testers have provided many great resources.
Preventing Social Engineering Breaches
Oct 05, 2020 Casey Cammilleri

Preventing Social Engineering Breaches

It’s pretty common for companies to bundle social engineering into their penetration testing programs. But when the report shows up, you may find you’re surprised and frustrated at the rate of employees clicking links to open malicious documents. How were my employees so easily manipulated? And why didn’t anyone on the IT staff catch this? Don’t sweat it. Happens to...
3 Phishing Streams to Watch and Safeguard
Aug 05, 2020 Nicholas Anastasi

3 Phishing Streams to Watch and Safeguard

There are cybersecurity phishing streams & threats constantly growing and evolving. Email spam is no longer the front line of the battlefield. Here are 3 new phishing streams beyond email - and how to safeguard them.
1 2 3 4 5 »