Find the latest Webinar content from the Sprocket Testing Team.

Blog

Stay updated with the latest offensive security news, knowledge, and resources.

Latest Resources

A Love Letter to Nmap
Apr 24, 2025 Topher Lyons

A Love Letter to Nmap

A tool that can scan remote endpoints and provide details on if a host is live and what open ports and services exist on the host. In this blog, I’ll explore some unique and more advanced ways to use Nmap that will make you fall even more in love with the tool.
Ahead of the Breach - Ayyappan Rajesh, Offensive Security Engineer at Block Harbor
Apr 22, 2025 Sprocket Security

Ahead of the Breach - Ayyappan Rajesh, Offensive Security Engineer at Block Harbor

Ayyappan Rajesh, Offensive Security Engineer at Block Harbor Cybersecurity, takes Casey deep into the technical underbelly of wireless security testing in this illuminating episode of Ahead of the Breach.
Ahead of the Breach - Eyal Paz, VP of Research at OX Security
Apr 09, 2025 Sprocket Security

Ahead of the Breach - Eyal Paz, VP of Research at OX Security

Introducing security into development pipelines is walking a tightrope — one false step can turn developers against your security program.
Vulnerability Assessment Process and 5 Critical Best Practices
Apr 02, 2025 Sprocket Security

Vulnerability Assessment Process and 5 Critical Best Practices

A vulnerability assessment identifies and evaluates potential security weaknesses in an organization's systems.
A Vulnerability Hunter's View of Next.js (CVE-2025-29927) Exploit Validation
Mar 27, 2025 Nick Aures

A Vulnerability Hunter's View of Next.js (CVE-2025-29927) Exploit Validation

Explore a security expert's take on validating the Next.js CVE-2025-29927 exploit, its impact, and techniques for assessing and mitigating the risk.
Understanding Pretexting: Techniques, Examples, and Prevention
Mar 27, 2025 Sprocket Security

Understanding Pretexting: Techniques, Examples, and Prevention

Pretexting is a social engineering attack where the attacker fabricates a scenario (or pretext) to manipulate the target into divulging personal information.
1 2 3 4 5 »