Certification Experience: OSCP and PWKv2
Strategy recommendations, pitfalls to avoid, and why you should just write the lab report for crying out loud. There’s a reason why this certification has a reputation. The material covers [...]
Strategy recommendations, pitfalls to avoid, and why you should just write the lab report for crying out loud. There’s a reason why this certification has a reputation. The material covers [...]
Key elements of penetration tests that actually work for you. Everyone seems to have a different idea of what a penetration test is. Does it involve phishing employees? What about [...]
This webinar will define and explain common penetration test offerings in detail, outline the key differences and benefits, and help you decide which engagement type is the best fit for [...]
Password cracking by the book is expensive, complicated and difficult to scale. Trying to crack passwords on laptops is comparatively slow and unhelpful. Investing in a rack of Nvidia graphics [...]
The part where hashcat does a ton of heavy lifting. In the last post, I discussed how some simple character conversion and inferences about human behavior revealed some harrowing elements [...]
Or: how I learned to stop worrying and love AWS GPU clusters. Photo by Alberto Frías on Unsplash Passwords are terrible. And I don’t mean just your Netflix password or [...]
How to progress toward a truly secure organization and infrastructure after penetration testing. You did it – you paid for penetration testing services. Whether it was to fulfill a potential [...]
When most people think of hacking, they think of what Hollywood portrays. In a dark basement, a hooded, perhaps tattooed outcast rapidly types nonsensical keystrokes at a flashy computer monitor [...]
There is understandably quite a bit of confusion in the market place when it comes to offensive security engagements. Consultants use a number of terms and phrases that often times [...]
Critical Vulnerabilities in AMD Chips Security researchers at CTS-Labs, based out of Israel, disclosed 13 critical vulnerabilities and backdoors in certain AMD chips used in workstations, laptops and servers. Successful [...]