We use cookies to ensure our website works properly and to enhance your experience. By continuing to visit this site, you agree to our use of cookies for traffic analysis, personalized advertising, and more. For more details, see our Cookie Notice.
All Resources
Library
Explore our collection of resources, including blog articles, webcasts, case studies, and eBooks.
Change Detection is the cog that turns it all for our continuous penetration testing solution. Sprocket’s attack surface management gives your organization deep visibility into the very same shadow IT assets our testers test against.
During the past few assessments, Sprocket has encountered improperly configured instances of Lucee 5 and 4. This blog post will detail a straightforward method to execute remote code after acquiring administrative access to a Lucee login panel.
In this article, we will look at a few different takeover methods, detail how we find them, show how they are exploited, and the easy solution to fixing this potentially severe vulnerability.
Gordon Flesch Company is committed to securing its customers' data. By partnering with Sprocket, Gordon Flesch Company is now utilizing Sprocket's Internal & External Continuous Penetration Testing.
Citizens Bank is committed to securing its customers' highly sensitive financial data. By partnering with Sprocket, Citizens Bank now stays highly aware of emerging threats that may affect its attack surface. By leveraging Continuous Penetration Testing with Sprocket, identification, and remediation efforts are improved upon seamlessly.
Tools such as dirbuster, gobuster, feroxbuster, dirb, and ffuf have been instrumental in uncovering hidden content on websites. These tools and wordlists designed to discover files and directories have become staples in the toolkits of penetration testers and bug bounty hunters. Now more than ever, technology plays a vital role in cybersecurity practices.