Varonis debuts trailblazing features for securing Salesforce. Learn More

Varonis named a Leader in The Forrester Wave™: Data Security Platforms, Q1 2023

Read the report

Varonis Seven Part Guide to Penetration Testing

1 min read
Last updated Oct 14, 2022

Contents

    Our sprawling pen-testing series has taken on a life of its own!  For your convenience and blog reading pleasure, we’ve assembled all the links to this six seven part series below.

    Read consecutively, or since they’re mostly self-contained posts, skip ahead to the topics that appeal to you.

    Part 1: Risky Business

    Part 2: Rats!

    Part 3: Rats & Reverse Shells

    Part 4: Making a Lateral Move

    Part 5: Hash Dumping & Cracking

    Part 6: Passing the Hash

    Part 7: Exfiltration and Conclusions

    By the way, if you just want a list of good pen testing tools for newbies, check out this post.

    What you should do now

    Below are three ways we can help you begin your journey to reducing data risk at your company:

    1. Schedule a demo session with us, where we can show you around, answer your questions, and help you see if Varonis is right for you.
    2. Download our free report and learn the risks associated with SaaS data exposure.
    3. Share this blog post with someone you know who'd enjoy reading it. Share it with them via email, LinkedIn, Twitter, Reddit, or Facebook.

    Free Data Risk Assessment

    Join 7,000+ organizations that traded data darkness for automated protection. Get started in minutes.