Find the latest Webinar content from the Sprocket Testing Team.

Blog

Stay updated with the latest offensive security news, knowledge, and resources.

Latest Resources

Tools for Evading External Network Security Controls
Dec 09, 2022 Nate Fair

Tools for Evading External Network Security Controls

Offensive operations require evasion techniques to bypass security controls. Testers will often find that their attacks against web applications, Office 365, and other external endpoints are quickly blocked. Read our guide outlining the tools we use here at Sprocket to help us effectively attack our client's infrastructure including Fireprox, proxybroker2 and http-proxy-ipv6-pool.
The Best Penetration Testing Tools & Learning Resources for 2022
Nov 11, 2022 Sprocket Security

The Best Penetration Testing Tools & Learning Resources for 2022

Learn penetration testing best practices from industry pros to prevent breaches, reduce exposure, and keep your digital assets secure.
The Top 7 Most Exploitable CVEs in 2022
Nov 04, 2022 Sprocket Security

The Top 7 Most Exploitable CVEs in 2022

Vulnerability management can be an overwhelming task with so many new vulnerabilities identified each year. Learn about the top vulnerabilities of 2022, which should be at the top of your patch priority list.
Top Information Security News Resources - 2022
Oct 28, 2022 Sprocket Security

Top Information Security News Resources - 2022

Cybersecurity is a fast-changing field, and staying up-to-date on emerging trends and the ever-shifting threat landscape is vital to protecting your data. Fortunately, the internet is home to a profusion of information security news sources and blogs. To help you stay informed, we’ve put together a list of some of the best cybersecurity blogs and news resources.
Why no Workstation Needs Inbound SMB
Oct 12, 2022 Sprocket Security

Why no Workstation Needs Inbound SMB

Know the risks and attack vectors associated with allowing inbound SMB port connectivity to workstations with an emphasis on lateral movement tools and techniques. See how Continuous Penetration Testing is highly useful for augmenting the current security control landscape implemented by the business.
How to Share Passwords and Backups Securely Posthumously
Sep 29, 2022 Casey Cammilleri

How to Share Passwords and Backups Securely Posthumously

A tutorial on how to build a secure, distributed, and multiple authorization backup method to recovery your digital life.