The three vectors of a pentest engagement.

The three vectors of a pentest engagement.

There are 3 vectors that define a penetration test engagement. I. Knowledge of the attacker Blackbox The attacker has no previous knowledge of the scope, its technology stack nor the security controls implemented. Graybox The attacker has limited knowledge of the...

Red Teaming – What is it and do you need it?

Intro If you are involved with the infosec community odds are that you have heard the term “red teaming”; but do you know where the term originates from, what does it include when we are talking cybersecurity, and finally is it something that your organisation needs?...
IoT Penetration Testing Part 1

IoT Penetration Testing Part 1

Part 1 In this blog post series, we will show you certain steps among with the tools used in order to conduct IoT security assessments. In this first part you will need a .bin file of a device firmware in order to continue.   Tools needed file   It...

Share This

Share this post with your friends!