Developing Hacking Kung Fu (or How To Get Into Information Security)
Derek Banks // More than occasionally I am asked how to get into Information Security as a profession. As attacks and breaches continue to escalate in frequency the demand […]
Derek Banks // More than occasionally I am asked how to get into Information Security as a profession. As attacks and breaches continue to escalate in frequency the demand […]
Brian Fehrman //
John Strand // AV is Dead Long Live Whitelisting. We have been discovering more and more of our tests bypass AV controls with ease. We have yet to see any iteration or […]
John Strand // There have been quite a few articles lately on how compliance standard X or Y is broken. Unfortunately, this often leads to blaming the nameless and faceless people behind the […]
Joff Thyer // Many of us in the penetration testing community are used to scenarios whereby we land a targeted phishing campaign within a Windows enterprise environment and have […]
Joff Thyer // When performing a penetration of test of organizations with Windows desktops, many testers will now resort to using tools like Veil’s Powershell Empire in order to […]