Although Cyber Security Awareness month is coming to an end, that doesn’t mean your efforts to better protect your information should too. With an act of cyber crime occurring once every 39 seconds and resulting in trillions of dollars in worldwide damage each year, making sure you’re cyber smart has never been more important. Read More
Scenario 2: Mixed Domain In part 2 of our Lateral Movement article series, we’re going to cover a second penetration test scenario which focuses on mixed domains. Read More
In the last article we talked about surveying a network that a penetration tester may land in during a penetration test. Finding and scanning hosts in that network is integral to lateral movement. How can a penetration tester hop to a new target if they don’t scan and survey the target network first? Read More
“Ma’am/Sir, we need to order a penetration test.” There are a lot of thoughts and emotions that arise when someone says that sentence at a company. Whether it is an initial occurrence, a scheduled event, or because of an incident or breach, the feelings and thoughts tend to be the same. Read More
While organizations continue their full-scale integration within the digital world, hackers are targeting companies that aren’t fully secure. As a result, $2.9 million is lost every minute due to cyber crime, and your customers are relying on you to have an impenetrable defense against it. Read More
Malware and Ransomware as a Service (RaaS) are multimillion dollar industries, dominated by criminal organizations that are centralized much like modern corporations, with executives, sales staff, and communications teams. Read More
We all know our primary colors are red, blue and yellow, and we know they can come together to create secondary colors, like purple! While this may sound like an art class, red, blue and purple are in fact different cyber security approaches as well as highly skilled teams. These teams are responsible for protecting your organization’s most critical assets from unseen attackers. Read More
In Part 1 of Pentesting 101: Surveying, we discussed the Metasploit framework and how to create a database of network and host information in addition to how you can route packets and connections through a host. In Part 2, we will cover other tools to use during a penetration test as well as troubleshooting techniques. Read More
In the last article we covered how to catch a callback from a target network. Catching a callback is not necessarily a tough task but it does require a bit of finesse and accurate parameters. Once you have a foothold on the network, it’s now time to find out where to move and where to maintain a presence within the target environment. Read More
In our last blog post, we identified the first three tools Pentesters need to know, which include various social media platforms for information gathering as well as Nmap and FPing for host / port scanning. In part two, we will continue to take a look at a few other key tools needed and when they should be used. Read More

Subscribe to INE Blog Updates

New Blog Posts!