Our sprawling pen-testing series has taken on a life of its own! For your convenience and blog reading pleasure, we’ve assembled all the links to this six seven part series below.
Read consecutively, or since they’re mostly self-contained posts, skip ahead to the topics that appeal to you.
Part 1: Risky Business
Part 2: Rats!
Part 3: Rats & Reverse Shells
Part 4: Making a Lateral Move
Part 5: Hash Dumping & Cracking
Part 6: Passing the Hash
Part 7: Exfiltration and Conclusions
By the way, if you just want a list of good pen testing tools for newbies, check out this post.
What you should do now
Below are three ways we can help you begin your journey to reducing data risk at your company:
- Schedule a demo session with us, where we can show you around, answer your questions, and help you see if Varonis is right for you.
- Download our free report and learn the risks associated with SaaS data exposure.
- Share this blog post with someone you know who'd enjoy reading it. Share it with them via email, LinkedIn, Twitter, Reddit, or Facebook.

Michael Buckbee
Michael has worked as a sysadmin and software developer for Silicon Valley startups, the US Navy, and everything in between.