Our sprawling pen-testing series has taken on a life of its own! For your convenience and blog reading pleasure, we’ve assembled all the links to this
six seven part series below.
Read consecutively, or since they’re mostly self-contained posts, skip ahead to the topics that appeal to you.
Part 1: Risky Business
Part 2: Rats!
Part 3: Rats & Reverse Shells
Part 4: Making a Lateral Move
Part 5: Hash Dumping & Cracking
Part 6: Passing the Hash
Part 7: Exfiltration and Conclusions
By the way, if you just want a list of good pen testing tools for newbies, check out this post.
Does your cybersecurity start at the heart?
Get a highly customized data risk assessment run by engineers who are obsessed with data security.