The Point (and Click) of Phishing Exercises

The Point (and Click) of Phishing Exercises

When we speak with companies about performing phishing tests, one of the most common responses is “We know a lot […] ...

How Penetration Testing can help prevent Ransomware Attacks

It is hard to believe, but ransomware is more than three decades old.  While many would think that the ransomware mayhem started with the WannaCry attack of 2017, that is simply the ...
Relaying NTLM Authentication from SCCM Clients

Relaying NTLM Authentication from SCCM Clients

tl;dr: Seriously, please disable NTLMI recently learned that you can coerce NTLM authentication from SCCM servers using any Windows SCCM client when automatic site-wide client push installation is enabled and NTLM has not ...
EH-Net - Wylie - Wireless Pentesting Part 4 – Performing an Actual Wireless Pentest

Wireless Pentesting Part 4 – Performing an Actual Wireless Pentest

In the previous article of this series, “Wireless Pentesting Part 3 – Common Wireless Attacks”, we discussed various scenarios to give you a better grasp of how wireless networks and clients can ...

Video: Android Hacking Proving Ground

Watch Now to Upgrade Your Android Hacking Skills! Video and Slide Deck from EH-Net Live! Sept 2020 The world has gone mobile crazy. It seems as though no one can live without ...
Android Virtual Device for a Mobile PenTest

How to configure Android (Virtual) for Mobile PenTest

This post is about setting up an Android Virtual Machine (AVD) for a mobile application penetration test ...
EH-Net Live! - Sept 2020 - Android Hacking Proving Ground - Register Now

Webinar: Android Hacking Proving Ground

Register Now to Upgrade Your Android Hacking Skills! The world has gone mobile crazy. It seems as though no one can live without their smartphone, and Android dominates the scene with over ...
EH-Net - Wylie - Wireless Pentesting Part 3 - Common Wireless Attacks

Wireless Pentesting Part 3 – Common Wireless Attacks

In the previous article of this series, “Wireless Pentesting Part 2 – Building a WiFi Hacking Rig”, we discussed building a WiFi hacking rig. We covered the hardware, operating systems, and software ...

Video: Bad As You Want To Be – Adversary Emulation Basics

Watch Now to Amp Up Your Red Team! Video and Slide Deck from EH-Net Live! May 2020 OK… so your infrastructure is pretty much locked down, your SOC is solid, you do ...

Webinar: Bad As You Want To Be – Adversary Emulation Basics

Register Now to Amp Up Your Red Team! OK… so your infrastructure is pretty much locked down, your SOC is solid, you do regular pentests and even leveled up to include threat ...