pentest

NSFOCUS Licensed for SOC and Pentest Service in Malaysia in Accordance with Cyber Security Act 2024
Santa Clara, Calif. January 23, 2025 – NSFOCUS, a global provider of intelligent hybrid security solutions, today announced that it has received two security service licenses from the National Cyber Security Agency ...

How to do Penetration Testing effectively
Do you want to enhance your organisation’s cybersecurity by identifying and addressing vulnerabilities before they can be exploited? Mastering the art of penetration testing is a vital skill for any security professional ...

The Point (and Click) of Phishing Exercises
When we speak with companies about performing phishing tests, one of the most common responses is “We know a lot […] ...
How Penetration Testing can help prevent Ransomware Attacks
It is hard to believe, but ransomware is more than three decades old. While many would think that the ransomware mayhem started with the WannaCry attack of 2017, that is simply the ...

Relaying NTLM Authentication from SCCM Clients
tl;dr: Seriously, please disable NTLMI recently learned that you can coerce NTLM authentication from SCCM servers using any Windows SCCM client when automatic site-wide client push installation is enabled and NTLM has not ...

Wireless Pentesting Part 4 – Performing an Actual Wireless Pentest
In the previous article of this series, “Wireless Pentesting Part 3 – Common Wireless Attacks”, we discussed various scenarios to give you a better grasp of how wireless networks and clients can ...
Video: Android Hacking Proving Ground
Watch Now to Upgrade Your Android Hacking Skills! Video and Slide Deck from EH-Net Live! Sept 2020 The world has gone mobile crazy. It seems as though no one can live without ...

How to configure Android (Virtual) for Mobile PenTest
This post is about setting up an Android Virtual Machine (AVD) for a mobile application penetration test ...

Webinar: Android Hacking Proving Ground
Register Now to Upgrade Your Android Hacking Skills! The world has gone mobile crazy. It seems as though no one can live without their smartphone, and Android dominates the scene with over ...

Wireless Pentesting Part 3 – Common Wireless Attacks
In the previous article of this series, “Wireless Pentesting Part 2 – Building a WiFi Hacking Rig”, we discussed building a WiFi hacking rig. We covered the hardware, operating systems, and software ...