Penetration testing February 8, 2022 Pedro Tavares Red Teaming: Credential dumping techniques Explore some popular techniques commonly used by red teaming experts and adversaries during their experiments.
Penetration testing January 19, 2022 Graeme Messina Top 6 bug bounty programs for cybersecurity professionals The best bug bounty programs for security researchers, including objectives, bugs and the potential bounties you can earn.
Penetration testing January 17, 2022 Pedro Tavares Tunneling and port forwarding tools used during red teaming assessments Learn about popular tools used during red teaming assessments.
Penetration testing December 22, 2021 Lester Obbayi SigintOS: Signal Intelligence via a single graphical interface SigintOS is a Linux distribution used for making signal intelligence gathering possible.
Penetration testing December 8, 2021 Pedro Tavares Top tools for mobile android assessments Explore some of the most used tools by security experts during mobile Android assessments.
Penetration testing November 24, 2021 Pedro Tavares Top tools for mobile iOS assessments Find a list of tools used during red teaming assessments to audit and ensure the security of mobile iOS applications.
Penetration testing November 16, 2021 Pedro Tavares Red Team: C2 frameworks for pentesting Find out some of the most used C2 post-exploitation frameworks for pentesting and much more.
Penetration testing November 1, 2021 Howard Poston Inside 1,602 pentests: Common vulnerabilities, findings and fixes Learn about the major findings of Cobalt’s The State of Pentesting 2021 report
Penetration testing October 19, 2021 Pedro Tavares Red teaming tutorial: Active directory pentesting approach and tools Organizations widely use Microsoft Active Directory (AD) networks to exchange information and manage their internal and critical infrastructures.
Penetration testing October 12, 2021 Pedro Tavares Red Team tutorial: A walkthrough on memory injection techniques Memory injection is a stealthy technique generally used to bypass defenses and inject additional payloads into a PE file or shellcode memory.