What being a hacker really means—no title required. After a decade in offensive security, Nate Fair shares honest lessons on hacking.
Resources
Blog
Blog
Keep up to date with the latest offensive security news, knowledge, and resources.
A tool that can scan remote endpoints and provide details on if a host is live and what open ports and services exist on the host. In this blog, I’ll explore some unique and more advanced ways to use Nmap that will make you fall even more in love with the tool.
Ayyappan Rajesh, Offensive Security Engineer at Block Harbor Cybersecurity, takes Casey deep into the technical underbelly of wireless security testing in this illuminating episode of Ahead of the Breach.
Automation is great at scanning for vulnerabilities. But supplementing automation alongside human testers actually strengthens your security posture.
Introducing security into development pipelines is walking a tightrope — one false step can turn developers against your security program.
A vulnerability assessment identifies and evaluates potential security weaknesses in an organization's systems.