All Resources

Library

Explore our collection of resources, including blog articles, webcasts, and case studies.

All Resources

Subdomain Takeovers - It’s Always DNS
Mar 07, 2024

Subdomain Takeovers - It’s Always DNS

In this article, we will look at a few different takeover methods, detail how we find them, show how they are exploited, and the easy solution to fixing this potentially severe vulnerability.
Gordon Flesch Company Partners with Sprocket Using Continuous Penetration Testing
Feb 26, 2024

Gordon Flesch Company Partners with Sprocket Using Continuous Penetration Testing

Gordon Flesch Company is committed to securing its customers' data. By partnering with Sprocket, Gordon Flesch Company is now utilizing Sprocket's Internal & External Continuous Penetration Testing.
Citizens Bank Partners with Sprocket To Improve Security Continuously
Feb 26, 2024

Citizens Bank Partners with Sprocket To Improve Security Continuously

Citizens Bank is committed to securing its customers' highly sensitive financial data. By partnering with Sprocket, Citizens Bank now stays highly aware of emerging threats that may affect its attack surface. By leveraging Continuous Penetration Testing with Sprocket, identification, and remediation efforts are improved upon seamlessly.
Directory Brute-forcing at Scale
Feb 15, 2024

Directory Brute-forcing at Scale

Tools such as dirbuster, gobuster, feroxbuster, dirb, and ffuf have been instrumental in uncovering hidden content on websites. These tools and wordlists designed to discover files and directories have become staples in the toolkits of penetration testers and bug bounty hunters. Now more than ever, technology plays a vital role in cybersecurity practices.
Surfacing the Invisible Web Application Attacks and Attack Surface Management
Jan 11, 2024

Surfacing the Invisible Web Application Attacks and Attack Surface Management

Watch for an insightful webinar as Will merges the worlds of web application penetration testing and Attack Surface Management (ASM) data. Using examples from real life penetration tests, he will demonstrate some of the ways web app vulnerabilities can be exploited using information from ASM data, often from overlooked or underestimated sources. Will will also discuss some of the methodologies...
Introducing Security Testing in QA
Jan 10, 2024

Introducing Security Testing in QA

Fixing these vulnerabilities in production is more expensive than finding and fixing them earlier in the SDLC. One way that organizations can drive down the cost of vulnerability management is by integrating security testing into software quality assurance (QA) testing.