Skip to content
Raxis
  • Home
  • Services
      Core Services
    • Raxis Red Team
    • AI Augmented Penetration Testing
    • Penetration Testing as a Service (PTaaS)
    • Elite Cybersecurity Services
    • Raxis listed as a Sample Vendor for Penetration Testing as a Service in two Gartner® Hype Cycle™, 2024 reports
    • Penetration Testing
    • Penetration Testing Services
    • Web Application Penetration Testing
    • API Security
    • Salesforce Applications
    • Internal Networks, Cloud, and VPC
    • External Networks and Internet
    • Wireless Networks
    • Mobile Applications
    • CyberSecurity Services
    • Compliance: PCI, HIPAA, GLBA, and more
    • Attack Surface Management
    • Breach and Attack Simulation
    • Cybersecurity Code Review
    • Cybersecurity Red Team
    • Phishing and Spear Phishing
    • Social Engineering
  • Industries
      Critical Infrastructure
    • Energy
    • Communications
    • Transportation
    • Water
    • Compliance Driven
    • Credit Card Industry (PCI)
    • Education
    • Finance and Banking
    • GLBA Safeguards Rule
    • Government Agencies
    • Healthcare (HIPAA)
    • Manufacturing
    • SOC 2
    • Technology
    • Technology and Software Development
    • Blockchain and Cryptocurrency
    • Media and Entertainment
    • Social Media
  • Resources
      Company Information
    • About Raxis
    • Careers
    • Meet Our Team
    • Signup for Raxis News
    • Resources
    • The Exploit Blog
    • Become a Raxis Partner
    • Certifications
    • Raxis One
    • Transporter Remote Pentesting
    • About Ethical Hacking
    • An Inside Look at a Raxis Red Team
    • Red, Blue, and Purple Teams
    • Penetration Test Glossary
    • What is a Penetration Test?
    • What is Web Application Penetration Testing?
  • The Exploit Blog
  • About Us
Contact Raxis Login
Raxis
Contact RaxisIcon Link to Contact Raxis
  • Home
  • Services
      Core Services
    • Raxis Red Team
    • AI Augmented Penetration Testing
    • Penetration Testing as a Service (PTaaS)
    • Elite Cybersecurity Services
    • Raxis listed as a Sample Vendor for Penetration Testing as a Service in two Gartner® Hype Cycle™, 2024 reports
    • Penetration Testing
    • Penetration Testing Services
    • Web Application Penetration Testing
    • API Security
    • Salesforce Applications
    • Internal Networks, Cloud, and VPC
    • External Networks and Internet
    • Wireless Networks
    • Mobile Applications
    • CyberSecurity Services
    • Compliance: PCI, HIPAA, GLBA, and more
    • Attack Surface Management
    • Breach and Attack Simulation
    • Cybersecurity Code Review
    • Cybersecurity Red Team
    • Phishing and Spear Phishing
    • Social Engineering
  • Industries
      Critical Infrastructure
    • Energy
    • Communications
    • Transportation
    • Water
    • Compliance Driven
    • Credit Card Industry (PCI)
    • Education
    • Finance and Banking
    • GLBA Safeguards Rule
    • Government Agencies
    • Healthcare (HIPAA)
    • Manufacturing
    • SOC 2
    • Technology
    • Technology and Software Development
    • Blockchain and Cryptocurrency
    • Media and Entertainment
    • Social Media
  • Resources
      Company Information
    • About Raxis
    • Careers
    • Meet Our Team
    • Signup for Raxis News
    • Resources
    • The Exploit Blog
    • Become a Raxis Partner
    • Certifications
    • Raxis One
    • Transporter Remote Pentesting
    • About Ethical Hacking
    • An Inside Look at a Raxis Red Team
    • Red, Blue, and Purple Teams
    • Penetration Test Glossary
    • What is a Penetration Test?
    • What is Web Application Penetration Testing?
  • The Exploit Blog
  • About Us

The Exploit

Raxis Cybersecurity Insights From The Frontlines

  • The following is a reenactment of a typical physical security assessment performed by a professional Raxis security engineer
    Exploits | Penetration Testing | Security Recommendations

    Here’s How Hackers Can Get Through Your Doors and Onto Your Network

    ByBrian Tant June 12, 2020July 28, 2025

    Just a guy who left something at work and had to run back in? But that’s not my office, that’s not my badge, and, at sunset, my day is just getting started.

    Read More Here’s How Hackers Can Get Through Your Doors and Onto Your NetworkContinue

  • Canned air attack
    Exploits | Penetration Testing | Security Recommendations

    Can This Simple Trick Outwit Your Smart Security?

    ByBrad Herring June 5, 2020

    Armed with nothing more than an ordinary can of cool, compressed air, a hacker can gain entry to a key-card-only access facility in just 19 seconds. Skeptical? See for yourself.

    Read More Can This Simple Trick Outwit Your Smart Security?Continue

  • Hand using plastic card to open a locked door
    Exploits | In The News | Patching | Security Recommendations

    Windows 10 Vulnerability Highlights Need for Physical Security Testing

    ByRaxis Research Team May 28, 2020July 28, 2025

    A Windows 10 security problem offers an excellent example of what can happen when a bad guy gets to spend a few minutes alone with your computer.

    Read More Windows 10 Vulnerability Highlights Need for Physical Security TestingContinue

  • Scientist putting a specimen in a test tube
    Exploits | In The News | Security Recommendations

    Pharma Breaches and the Terrifying Prospect of Data Manipulation

    ByBrian Tant May 14, 2020July 28, 2025

    Raxis CTO Brian Tant shares his thoughts on cybersecurity threats to the pharma industry and what pharma companies can do to protect themselves.

    Read More Pharma Breaches and the Terrifying Prospect of Data ManipulationContinue

  • IKE VPNs Supporting Aggressive Mode
    Exploits | How To | Password Cracking

    IKE VPNs Supporting Aggressive Mode

    ByBonnie Smyre May 23, 2018

    In this post we’ll look at why IKE VPNs with Aggressive Mode enabled continue to be a vulnerability, how it can be exploited, and how to mitigate this risk.

    Read More IKE VPNs Supporting Aggressive ModeContinue

  • Web Attacks: Insecure Transmission of Data
    Exploits | Web Apps

    Web Attacks: Insecure Transmission of Data

    ByBonnie Smyre April 26, 2018June 3, 2025

    Raxis COO Bonnie Smyre discusses the vulnerabilities that arise when web apps transmit data insecurely and what you can do to secure your apps.

    Read More Web Attacks: Insecure Transmission of DataContinue

  • Web Attacks: Clickjacking
    Exploits | Web Apps

    Web Attacks: Clickjacking

    ByBonnie Smyre April 19, 2018January 17, 2025

    Many of the external network and web application penetration tests that we perform list ‘clickjacking’ as a vulnerability. Here Raxis COO Bonnie Smyre explains what clickjacking is and how you can protect against it.

    Read More Web Attacks: ClickjackingContinue

  • Aerial Drones - A New Frontier for Hackers?
    Exploits | In The News | Social Engineering

    Aerial Drones – A New Frontier for Hackers

    ByBrad Herring January 2, 2017

    Raxis VP of Business Development discusses how aerial drones, which are now prevalent, can be used in attacks on your security and what you can do to protect your company.

    Read More Aerial Drones – A New Frontier for HackersContinue

  • Fingerprint on keyboard
    Exploits | How To | Password Cracking | Tips For Everyone

    The Weakest Link in the Password Hash

    ByBrad Herring October 16, 2016

    Raxis VP of Business Development explains easy rules to use to make your passwords more secure and harder for hackers to crack.

    Read More The Weakest Link in the Password HashContinue

  • Data Breach, Cyber Attack, Protection Failed, System Safety Compromised
    Exploits | How To | Password Cracking

    HP iLO Password Cracking

    ByMark Puckett November 28, 2014

    Raxis CEO Mark Puckett shows how simple and fast it is for a hacker to crack a weak HP iLO password hash.

    Read More HP iLO Password CrackingContinue

Page navigation

Previous PagePrevious 1 … 3 4 5

2870 Peachtree Road
Suite #915-8924
Atlanta, GA 30305 USA

Contact us online

About Raxis

  • About Raxis
  • Careers
  • Terms and Conditions
  • Privacy Policy
  • Partners, Apply Here

Resources

  • The Exploit
  • Transporter Remote Penetration Testing
  • Penetration Test Glossary
  • What is a Penetration Test?
Facebook X Instagram Linkedin YouTube