top of page
Search

Introduction to Proving Grounds
The Proving-Grounds offers both free and paid tier levels, where users can test their skills in a lab environment similar to other platforms
Esther Matut
Aug 16, 20238 min read

Playing with Bubbles: An Introduction to DLL-Sideloading
DLL Side-Loading is a pervasive technique partially because its behavior is difficult to detect. As a sub-technique of DLL Hijacking, it ta
Erica Zelickowski
Jul 25, 20235 min read


How to go Phishing with Gophish
How to conduct basic phishing campaigns using Gophish, an open-source tool for testing an organization’s vulnerability to phishing.
Nihaal Prasad
Aug 10, 20217 min read

Top 3 Reasons Why Organizations Should Get a Penetration Test Today
Cybersecurity breaches and other incidents have become increasingly frequent and more impactful over the last year. In a recent high-profile
Mattia Campagnano
Feb 23, 20214 min read


Masterful Policies and Compliance: Industries, Policies, Regulations, and How to Get Started
Policy assessments should be considered as a cybersecurity best practice and should be conducted annually with other assessments such as vul
Liana Parakesyan
Nov 4, 20206 min read

Vulnerability Scanners and the SAINT Experience
Vulnerability scanners assist in the identification and detection of vulnerabilities arising from misconfigurations or insecure coding with
Mattia Campagnano & Wade Ma
Jul 14, 20209 min read

Weaponizing Windows Binaries and Scripts (LOLBAS): What's Old Is New Again
One of the latest trends in penetration testing and malware development is to weaponize the so-called Living Off the Land Binaries and Scrip
Mattia Campagnano
May 20, 20207 min read

Ransomware Attacks Are on the Rise, Should You Pay the Ransom?
However, sometimes the answer to this question cannot be so clear-cut. Much depends on how valuable the information being held for ransom is
Mattia Campagnano
Feb 3, 20209 min read


Wi-Fi Hacking: A How To for Penetration Testers
To sniff Wi-Fi, we use Alfa USB Wi-Fi adapter which connects to laptop via USB. For longer range sniffing, the 16 dBi Yagi antenna can be co
Liana Parakesyan
May 15, 20197 min read


Netcat Reverse Shell Fixup
*This blog entry was originally published on July 27, 2015 on the original Polito Blog by Ian Duffy . It was re-posted on October 3, 2017...
Ian Duffy
Jul 27, 20173 min read


Vulnerability Assessment vs. Penetration Test: Key Differences and Objectives
On occasion we encounter questions about the differences between a vulnerability assessment and penetration test. While the end goal in both
Ben Hughes
Mar 13, 20175 min read
bottom of page