Varonis Seven Part Guide to Penetration Testing

Our sprawling pen-testing series has taken on a life of its own!  For your convenience and blog reading pleasure, we’ve assembled all the links to this six seven part series below....
1 min read
Last updated October 14, 2022

Our sprawling pen-testing series has taken on a life of its own!  For your convenience and blog reading pleasure, we’ve assembled all the links to this six seven part series below.

Read consecutively, or since they’re mostly self-contained posts, skip ahead to the topics that appeal to you.

Part 1: Risky Business

Part 2: Rats!

Part 3: Rats & Reverse Shells

Part 4: Making a Lateral Move

Part 5: Hash Dumping & Cracking

Part 6: Passing the Hash

Part 7: Exfiltration and Conclusions

By the way, if you just want a list of good pen testing tools for newbies, check out this post.

What should I do now?

Below are three ways you can continue your journey to reduce data risk at your company:

1

Schedule a demo with us to see Varonis in action. We'll personalize the session to your org's data security needs and answer any questions.

2

See a sample of our Data Risk Assessment and learn the risks that could be lingering in your environment. Varonis' DRA is completely free and offers a clear path to automated remediation.

3

Follow us on LinkedIn, YouTube, and X (Twitter) for bite-sized insights on all things data security, including DSPM, threat detection, AI security, and more.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.

Keep reading

Varonis tackles hundreds of use cases, making it the ultimate platform to stop data breaches and ensure compliance.

5-must-know-salesforce-security-tips
5 Must-Know Salesforce Security Tips
Learn actionable strategies to safeguard your data – both within Salesforce and across your broader ecosystem.
varonis-announces-new-microsoft-purview-dspm-integration
Varonis Announces New Microsoft Purview DSPM Integration
The integration between Varonis and Purview helps organizations see and understand their critical data—wherever it lives.
what-is-database-activity-monitoring?-dam-explained
What is Database Activity Monitoring? DAM Explained
A critical component of any organization's security strategy, Database Activity Monitoring tools are used by organizations to fulfill compliance criteria and protect sensitive data.
rethinking-database-security-for-the-age-of-ai-and-cloud
Rethinking Database Security for the Age of AI and Cloud
Discover the pillars of database security and how Varonis Next-Gen database activity monitoring (DAM) protects sensitive data in AI and cloud environments.