Fail of the Week: Padlock Purports to Provide Protection, Proves Pathetic

Anyone in the know about IoT security is likely to steer clear of a physical security product that’s got some sort of wireless control. The list of exploits for such devices is a long, sad statement on security as an afterthought, if at all. So it’s understandable if you think …read more

Continue reading Fail of the Week: Padlock Purports to Provide Protection, Proves Pathetic

Video: Burp-less Hacking – Learning Web Application Pentesting on a Budget

See FOSS Tools for WebApp Pentests!
Video and Slide Deck from EH-Net Live! December 2019
Web Application Penetration Testing, or webapp pentesting, to put it simply is poking at the code behind a web site to see if there are any holes. If there are, ho… Continue reading Video: Burp-less Hacking – Learning Web Application Pentesting on a Budget

Webinar: Burp-less Hacking – Learning Web Application Pentesting on a Budget

Register Now to See a Full WebApp Pentest w/ FOSS!
If there is one tool that a professional performing a web application penetration test or bug bounty hunting should buy, it’s Burp Suite Pro. But what if you’re just starting and have no bu… Continue reading Webinar: Burp-less Hacking – Learning Web Application Pentesting on a Budget

Team Pentesting – The Unspoken Reality of Career Ethical Hacking

As a professional penetration tester, there’s one thing that rarely if ever gets discussed. Is it that the common image of a hacker, the lone wolf pounding away on a keyboard in a dark room only taking breaks for caffeine and cold pizza and, of … Continue reading Team Pentesting – The Unspoken Reality of Career Ethical Hacking

Wireless Pentesting Part 2 – Building a WiFi Hacking Rig

In the first article of this series, “Wireless Pentesting Part 1 – An Overview”, we reviewed some penetration testing basics with the PTES and what one can expect to know about a system before starting an engagement. We also covered t… Continue reading Wireless Pentesting Part 2 – Building a WiFi Hacking Rig

Wireless Pentesting Part 1 – An Overview

As networks and computing systems have become more secure through the evolution of next generation firewalls, intrusion prevention systems (IPS), and endpoint security, attackers have shifted their focus. Web applications, mobile devices and apps, IoT … Continue reading Wireless Pentesting Part 1 – An Overview

Pentest secures contract with global techn corp, Xcina Consulting becomes preferred supplier

Shearwater Group, the organizational resilience group, announces that its group company, Pentest has secured a one-year contract with a global technology corporation worth in excess of US$1 million. At the same time, Xcina Consulting, another Shearwate… Continue reading Pentest secures contract with global techn corp, Xcina Consulting becomes preferred supplier