top of page
Search
Esther Matut
Aug 16, 20238 min read
Introduction to Proving Grounds
The Proving-Grounds offers both free and paid tier levels, where users can test their skills in a lab environment similar to other platforms
Erica Zelickowski
Jul 25, 20235 min read
Playing with Bubbles: An Introduction to DLL-Sideloading
DLL Side-Loading is a pervasive technique partially because its behavior is difficult to detect. As a sub-technique of DLL Hijacking, it ta
Nihaal Prasad
Aug 10, 20217 min read
How to go Phishing with Gophish
How to conduct basic phishing campaigns using Gophish, an open-source tool for testing an organization’s vulnerability to phishing.
Mattia Campagnano
Feb 23, 20214 min read
Top 3 Reasons Why Organizations Should Get a Penetration Test Today
Cybersecurity breaches and other incidents have become increasingly frequent and more impactful over the last year. In a recent high-profile
Liana Parakesyan
Nov 4, 20206 min read
Masterful Policies and Compliance: Industries, Policies, Regulations, and How to Get Started
Policy assessments should be considered as a cybersecurity best practice and should be conducted annually with other assessments such as vul
Mattia Campagnano & Wade Ma
Jul 14, 20209 min read
Vulnerability Scanners and the SAINT Experience
Vulnerability scanners assist in the identification and detection of vulnerabilities arising from misconfigurations or insecure coding with
Mattia Campagnano
May 20, 20207 min read
Weaponizing Windows Binaries and Scripts (LOLBAS): What's Old Is New Again
One of the latest trends in penetration testing and malware development is to weaponize the so-called Living Off the Land Binaries and Scrip
Mattia Campagnano
Feb 3, 20209 min read
Ransomware Attacks Are on the Rise, Should You Pay the Ransom?
However, sometimes the answer to this question cannot be so clear-cut. Much depends on how valuable the information being held for ransom is
Liana Parakesyan
May 15, 20197 min read
Wi-Fi Hacking: A How To for Penetration Testers
To sniff Wi-Fi, we use Alfa USB Wi-Fi adapter which connects to laptop via USB. For longer range sniffing, the 16 dBi Yagi antenna can be co
Ian Duffy
Jul 27, 20173 min read
Netcat Reverse Shell Fixup
*This blog entry was originally published on July 27, 2015 on the original Polito Blog by Ian Duffy . It was re-posted on October 3, 2017...
Ben Hughes
Mar 13, 20175 min read
Vulnerability Assessment vs. Penetration Test: Key Differences and Objectives
On occasion we encounter questions about the differences between a vulnerability assessment and penetration test. While the end goal in both
bottom of page