Welcome to The Exploit, the official blog of Raxis.
Our team of expert penetration testers and red team operators share insights on cybersecurity, real-world attack techniques, and the latest threat trends. From uncovering vulnerabilities to demonstrating how attackers think, The Exploit delivers practical knowledge to help organizations strengthen their defenses.
Raxis doesn’t just talk about cybersecurity — we live it every day. The Exploit is your front-row seat to the tactics, stories, and strategies that help organizations stay ahead of attackers.
The Exploit Categories
- Blog
- Careers
- Choosing a Penetration Testing Company
- Exploits
- How To
- In The News
- Injection Attacks
- Just For Fun
- Meet Our Team
- Mobile Apps
- Networks
- Password Cracking
- Patching
- Penetration Testing
- Phishing
- PTaaS
- Raxis In The Community
- Red Team
- Security Recommendations
- Social Engineering
- Tips For Everyone
- Web Apps
- What People Are Saying
- Wireless
-
Lateral Movement: From Beachhead to Breach
Raxis Senior Penetration Tester Nate Jernigan discusses lateral movement in penetration testing and the methods and tools he uses when performing these attacks.
-
Lessons from the DaVita Healthcare Ransomware Attack
By
The DaVita ransomware attack is one of the most impactful recent healthcare breaches. Learn what happened and what could have been done to limit…
-
HTTP/1.1 Security News: What You Can Do Now
By
A recent Portswigger white paper on HTTP/1.1 highlights critical security issues. If you use old products that still require it, here’s what you can…
-
Dev’s Fast Reporting of Phish Reduced Impact on Blockchain Malware Attacks
A recent successful phish allowed attackers to run malware targeting cryptocurrency transactions on various blockchains, but fast reporting limited the damage.
-
Cool Tools Series: Croc for Secure Data Exfiltration
Lead Penetration Tester Nathan Anderson provides tips on using croc for secure data exfiltration just like he does on red team engagements.
-
Dangers of Storing Sensitive Data in Web Storage: 5 Real Attack Scenarios
By
Lead Penetration Tester Ryan Chaplin walks us through 5 real-world attack scenarios used in real-world penetration tests by Raxis.