Our sprawling pen-testing series has taken on a life of its own!  For your convenience and blog reading pleasure, we’ve assembled all the links to this six seven part series below.

Read consecutively, or since they’re mostly self-contained posts, skip ahead to the topics that appeal to you.

Part 1: Risky Business

Part 2: Rats!

Part 3: Rats & Reverse Shells

Part 4: Making a Lateral Move

Part 5: Hash Dumping & Cracking

Part 6: Passing the Hash

Part 7: Exfiltration and Conclusions

By the way, if you just want a list of good pen testing tools for newbies, check out this post.

Andy Green

Andy Green

Andy blogs about data privacy and security regulations. He also loves writing about malware threats and what it means for IT security.