Inside Out Security Blog   /  

Varonis Seven Part Guide to Penetration Testing

Varonis Seven Part Guide to Penetration Testing


    Our sprawling pen-testing series has taken on a life of its own!  For your convenience and blog reading pleasure, we’ve assembled all the links to this six seven part series below.

    Read consecutively, or since they’re mostly self-contained posts, skip ahead to the topics that appeal to you.

    Part 1: Risky Business

    Part 2: Rats!

    Part 3: Rats & Reverse Shells

    Part 4: Making a Lateral Move

    Part 5: Hash Dumping & Cracking

    Part 6: Passing the Hash

    Part 7: Exfiltration and Conclusions

    By the way, if you just want a list of good pen testing tools for newbies, check out this post.

    What you should do now

    Below are three ways we can help you begin your journey to reducing data risk at your company:

    1. Schedule a demo session with us, where we can show you around, answer your questions, and help you see if Varonis is right for you.
    2. Download our free report and learn the risks associated with SaaS data exposure.
    3. Share this blog post with someone you know who'd enjoy reading it. Share it with them via email, LinkedIn, Twitter, Reddit, or Facebook.

    We're Varonis.

    We've been keeping the world's most valuable data out of enemy hands since 2005 with our market-leading data security platform.

    How it works