Keep reading
Varonis tackles hundreds of use cases, making it the ultimate platform to stop data breaches and ensure compliance.
Penetration Testing Explained, Part VII: Exfiltration and Conclusions
Michael Buckbee
March 3, 2016
In this series of posts, I covered ideas to get you started using basic testing software to find security vulnerabilities. There are more advanced tools, such as Metasploit, which lets...
Penetration Testing Explained, Part VI: Passing the Hash
Michael Buckbee
January 6, 2016
We’re now at a point in this series where we’ve exhausted all our standard tricks to steal credentials — guessing passwords, or brute force attacks on the hash itself. What’s...
Penetration Testing Explained, Part V: Hash Dumping and Cracking
Michael Buckbee
December 2, 2015
In the previous post in this series, I guessed a local password and then tried various ways to move laterally within my mythical Acme network. But what happens if you can’t...
Penetration Testing Explained, Part III: Playing with RATs and Reverse Shells
Michael Buckbee
October 8, 2015
Last week I broke into a Windows 2008 server and inserted a remote access trojan or RAT. Don’t call security, I did this in a contained environment within virtual machines....