How ethical hacking and pentesting is changing in 2022

Infosec Institute –  Infosec Institute –  Cybersecurity and information technology are constantly changing, so it’s no surprise that ethical hacking and pentesting are evolving with it. CompTIA recently performed a…

Ransomware penetration testing: Verifying your ransomware readiness

Infosec Institute –  Infosec Institute –  Ransomware is a top priority for almost all information security teams. It is a common, severe threat that can have devastating consequences for the…

Red Teaming: Main tools for wireless penetration tests

Infosec Institute –  Infosec Institute –  Nowadays, wireless networks are everywhere, connecting people, services, computers in a network etc. To evaluate the security of these kinds of networks and devices,…

Fundamentals of IoT firmware reverse engineering

Infosec Institute –  Infosec Institute –  The Internet of Things (IoT) is a trendy topic these days, and the number of critical vulnerabilities found in these devices is huge. As…

Red Teaming: Top tools and gadgets for physical assessments

Infosec Institute –  Infosec Institute –  Understanding the strengths and weaknesses of physical security controls in critical infrastructures is a valuable part of cybersecurity. Because from this angle, adversaries can…

Red teaming: Initial access and foothold

Infosec Institute –  Infosec Institute –  The initial access and foothold phase is a valuable part of a red teaming exercise, where we access the target. The techniques used to…

Top tools for red teaming

Infosec Institute –  Infosec Institute –  Cyberattacks make headlines every day. The pathways utilized by criminals are vast, sometimes sophisticated and stealthy, a clear sign of constant improvement and a…

What is penetration testing, anyway?

Infosec Institute –  Infosec Institute –  If you have a software system that protects valuable data or other assets, you probably want to have it tested for security vulnerabilities. That…

Red Teaming: Persistence Techniques

Infosec Institute –  Infosec Institute –  Persistence is a technique widely used by red teaming professionals and adversaries to maintain a connection with target systems after interruptions that can cut…

Red Teaming: Credential dumping techniques

Infosec Institute –  Infosec Institute –  Credential dumping is a technique that allows obtaining account credentials and password information in the form of a clear text password or a hash…