Exploits

Blog Archive Category

the exploit blog logo
The Exploit: Penetration Testing Insights From The Frontlines

The Exploit articles categorized as Exploits

  • The following is a reenactment of a typical physical security assessment performed by a professional Raxis security engineer

    Here’s How Hackers Can Get Through Your Doors and Onto Your Network

    By Brian Tant Just a guy who left something at work and had to run back in? But that’s not my office, that’s not my badge, and, at sunset, my day is just getting started. June 12, 2020
  • Canned air attack

    Can This Simple Trick Outwit Your Smart Security?

    By Brad Herring Armed with nothing more than an ordinary can of cool, compressed air, a hacker can gain entry to a key-card-only access facility in just 19 seconds. Skeptical? See for yourself. June 5, 2020
  • Hand using plastic card to open a locked door

    Windows 10 Vulnerability Highlights Need for Physical Security Testing

    By Raxis Research Team A Windows 10 security problem offers an excellent example of what can happen when a bad guy gets to spend a few minutes alone with your computer. May 28, 2020
  • IKE VPNs Supporting Aggressive Mode

    IKE VPNs Supporting Aggressive Mode

    By Bonnie Smyre In this post we’ll look at why IKE VPNs with Aggressive Mode enabled continue to be a vulnerability, how it can be exploited, and how to mitigate this risk. May 23, 2018