Find the latest Webinar content from the Sprocket Testing Team.

Shield check icon Security Research

Axios Got Backdoored Through a Trusted Account. Your CI/CD Pipeline Has the Same Problem.
Apr 02, 2026

Axios Got Backdoored Through a Trusted Account. Your CI/CD Pipeline Has the Same Problem.

The Axios supply chain attack exposed why dependency scanning fails against credential compromise. Learn how attackers backdoor popular packages and what your penetration tests are missing.
Popping Printers: How Your MFPs Are Handing Attackers Domain Admin
Mar 23, 2026

Popping Printers: How Your MFPs Are Handing Attackers Domain Admin

Multifunction printers silently store domain credentials, expose unauthenticated management interfaces, and sit on flat networks. Learn how attackers exploit MFPs to achieve domain admin in minutes.
Please Show Your Work: Bypassing JavaScript Proof-of-Work CAPTCHAs
Mar 10, 2026

Please Show Your Work: Bypassing JavaScript Proof-of-Work CAPTCHAs

Understanding how SiteGround’s proof-of-work CAPTCHA silently disrupts automated WordPress security scans and how to work around it.
Vulnerability Hunting a Retired App Part 1 - Auth Bypass
Mar 03, 2026

Vulnerability Hunting a Retired App Part 1 - Auth Bypass

Decompiling a retired .NET application reveals how a single middleware misconfiguration leads to full authentication bypass.
Putting the Token Before the Cart? A Guide on E-Commerce API Pentesting
Feb 26, 2026

Putting the Token Before the Cart? A Guide on E-Commerce API Pentesting

Why traditional API pentests miss real commerce risk and how cart tokens, checkout flows, and cross-layer auth gaps expose customer data.
LLMs Don't Follow Rules – They Follow Context
Feb 24, 2026

LLMs Don't Follow Rules – They Follow Context

LLM behavior isn't governed by a rulebook — it emerges from context, shaped by a stack of training, fine-tuning, and runtime instructions. Understanding this explains why the same model gives radically different responses to functionally identical requests.
Hunting Secrets in JavaScript at Scale: How a Vite Misconfiguration Lead to Full CI/CD Compromise
Feb 16, 2026

Hunting Secrets in JavaScript at Scale: How a Vite Misconfiguration Lead to Full CI/CD Compromise

Sometimes when conducting a Penetration Testing exercise or Red Team engagement, you might be interested in extracting password hashes or credentials of your target Windows user, without the use of Mimikatz to avoid detection. This is where you would resort to using an NTLM downgrade attack. In this article we shall discuss how you can be able to perform this...
The Dangers of Public Registration in Web Apps: How a JWT + oData Leaked Millions of Records
Feb 06, 2026

The Dangers of Public Registration in Web Apps: How a JWT + oData Leaked Millions of Records

Nick Aures guides us through a real-life pentesting moment with important lessons for authentication using industry-standard technology, in this case JWTs.
1 2 3 4 5

Your Always-On Security Engine

Our team utilizes a custom blend of methodologies from the best penetration testing standards.

Testing Lab Logos
Casey Cammilleri

As an offensive security team, we are committed to providing a world-class capability that blends more seamlessly with your larger operations. While there’s always more work to do, we pride ourselves on our commitment to the continuous model, and expanded risk intelligence it can provide to our customers. If you’re locked into a contract, but are curious to know what this band of practitioners can do, consider engaging us for our Red Team Events.

Casey Cammilleri
Founder & CEO
Eye icon

Webcasts

Explore our collection of webcasts to stay informed and inspired.

Nov 05, 2025
No slides. No sales pitches. Just real talk about how security leaders evaluate, select, and justify security solutions.
Watch Play icon
Oct 23, 2025
No slides. No sales pitches. Just real talk about how security leaders evaluate, select, and justify security solutions.
Watch Play icon
Aug 22, 2025
Join Sprocket's Team as they expose real techniques used to bypass security tools and learn what this means for validating security tools before you buy.
Watch Play icon
Jul 24, 2025
Penetration testing remains a core pillar of cybersecurity, but not all tests are created equal. This webinar with Sprocket Security and ISC2 recorded on July 24, 2025 explores 5 types ...
Watch Play icon
Jun 24, 2025
Black Hat and DEFCON (affectionately dubbed Hacker Summer Camp) is right around the corner! Join us as "hackers" everywhere gear up for one of the most anticipated events of the ...
Watch Play icon
Apr 04, 2025
On this episode of Pentesters Chat, our team explored offensive security engagements.
Watch Play icon
Apr 03, 2025
Whether you're just starting to explore ASM or are looking to refine your existing strategy, this webinar will provide valuable insights and actionable advice to strengthen your organization’s security posture.
Watch Play icon
Mar 07, 2025
The Sprocket testing team discusses Single Sign On (SSO).
Watch Play icon
Jan 31, 2025
The Sprocket testing team discusses Attack Surface Management.
Watch Play icon
Dec 06, 2024
The Sprocket testing team discusses Password Protected Systems.
Watch Play icon
Nov 04, 2024
The Sprocket testing team discusses AI and Machine Learning Systems.
Watch Play icon