Skip to content
Raxis
  • Home
  • Services
      Core Services
    • Raxis Red Team
    • AI Augmented Penetration Testing
    • Penetration Testing as a Service (PTaaS)
    • Elite Cybersecurity Services
    • Raxis listed as a Sample Vendor for Penetration Testing as a Service in two Gartner® Hype Cycle™, 2024 reports
    • Penetration Testing
    • Penetration Testing Services
    • Web Application Penetration Testing
    • API Security
    • Salesforce Applications
    • Cloud, VPC, and Internal Networks
    • External Networks and Internet
    • Wireless Networks
    • Mobile Applications
    • CyberSecurity Services
    • Compliance: PCI, HIPAA, GLBA, and more
    • Attack Surface Management
    • Breach and Attack Simulation
    • Cybersecurity Code Review
    • Cybersecurity Red Team
    • Phishing and Spear Phishing
    • Social Engineering
  • Industries
      Critical Infrastructure
    • Energy
    • Communications
    • Transportation
    • Water
    • Compliance Driven
    • Credit Card Industry (PCI)
    • Education
    • Finance and Banking
    • GLBA Safeguards Rule
    • Government Agencies
    • Healthcare (HIPAA)
    • Manufacturing
    • SOC 2
    • Technology
    • Technology and Software Development
    • Blockchain and Cryptocurrency
    • Media and Entertainment
    • Social Media
  • Resources
      Company Information
    • About Raxis
    • Careers
    • Meet Our Team
    • Signup for Raxis News
    • Resources
    • The Exploit Blog
    • Become a Raxis Partner
    • Certifications
    • Raxis One
    • Transporter Remote Pentesting
    • About Ethical Hacking
    • An Inside Look at a Raxis Red Team
    • Red, Blue, and Purple Teams
    • Penetration Test Glossary
    • What is a Penetration Test?
    • What is Web Application Penetration Testing?
  • The Exploit Blog
  • About Us
Contact Raxis Login
Raxis
Contact RaxisIcon Link to Contact Raxis
  • Home
  • Services
      Core Services
    • Raxis Red Team
    • AI Augmented Penetration Testing
    • Penetration Testing as a Service (PTaaS)
    • Elite Cybersecurity Services
    • Raxis listed as a Sample Vendor for Penetration Testing as a Service in two Gartner® Hype Cycle™, 2024 reports
    • Penetration Testing
    • Penetration Testing Services
    • Web Application Penetration Testing
    • API Security
    • Salesforce Applications
    • Cloud, VPC, and Internal Networks
    • External Networks and Internet
    • Wireless Networks
    • Mobile Applications
    • CyberSecurity Services
    • Compliance: PCI, HIPAA, GLBA, and more
    • Attack Surface Management
    • Breach and Attack Simulation
    • Cybersecurity Code Review
    • Cybersecurity Red Team
    • Phishing and Spear Phishing
    • Social Engineering
  • Industries
      Critical Infrastructure
    • Energy
    • Communications
    • Transportation
    • Water
    • Compliance Driven
    • Credit Card Industry (PCI)
    • Education
    • Finance and Banking
    • GLBA Safeguards Rule
    • Government Agencies
    • Healthcare (HIPAA)
    • Manufacturing
    • SOC 2
    • Technology
    • Technology and Software Development
    • Blockchain and Cryptocurrency
    • Media and Entertainment
    • Social Media
  • Resources
      Company Information
    • About Raxis
    • Careers
    • Meet Our Team
    • Signup for Raxis News
    • Resources
    • The Exploit Blog
    • Become a Raxis Partner
    • Certifications
    • Raxis One
    • Transporter Remote Pentesting
    • About Ethical Hacking
    • An Inside Look at a Raxis Red Team
    • Red, Blue, and Purple Teams
    • Penetration Test Glossary
    • What is a Penetration Test?
    • What is Web Application Penetration Testing?
  • The Exploit Blog
  • About Us

The Exploit

Raxis Cybersecurity Insights From the Frontlines

  • Wireless Series: Using Wifite to Capture and Crack a WPA2 Pre-Shared Key
    How To | Password Cracking | Penetration Testing | Wireless

    Wireless Series: Using Wifite to Capture and Crack a WPA2 Pre-Shared Key for Penetration Testing

    ByScottie Cole June 17, 2025June 18, 2025

    Principal Penetration Tester Scottie Cole begins our wireless penetration testing series with capturing and cracking a WPA2 Pre-Shared Key using Wifite.

    Read More Wireless Series: Using Wifite to Capture and Crack a WPA2 Pre-Shared Key for Penetration TestingContinue

  • Cool Tools Series: CeWL
    How To | Password Cracking

    Cool Tools Series: CeWL for Penetration Testing

    ByJason Taylor March 25, 2025August 19, 2025

    Lead Penetration Tester Jason Taylor discusses how the CeWL Custom Word List generator can improve hashcat results for penetration testing.

    Read More Cool Tools Series: CeWL for Penetration TestingContinue

  • Password Series: 8 Practical First Steps to Crack Difficult Passwords
    How To | Password Cracking | Penetration Testing

    Password Series: 8 Practical First Steps to Crack Difficult Passwords in Penetration Tests

    ByRyan Chaplin February 25, 2025August 19, 2025

    From rulesets & hardware to wordlists and mask attacks, Lead Penetration Tester Ryan Chaplin shows how to crack difficult password hashes in penetration tests.

    Read More Password Series: 8 Practical First Steps to Crack Difficult Passwords in Penetration TestsContinue

  • Password Series: Defeating Emerging Password Security Trends with Psudohash
    How To | Password Cracking | Penetration Testing

    Password Series: Defeating Emerging Password Security Trends with Psudohash for Penetration Testing

    ByRyan Chaplin November 5, 2024June 16, 2025

    Lead Pentester Ryan Chaplin discusses emerging improvements in password security and how Psudohash can help bypass them on penetration tests.

    Read More Password Series: Defeating Emerging Password Security Trends with Psudohash for Penetration TestingContinue

  • Password Length: More than Just a Question of Compliance
    Password Cracking | Security Recommendations | Tips For Everyone

    Password Length: More than Just a Question of Compliance

    ByBrian Tant June 4, 2024August 18, 2025

    Password length requirements are a key part of password security, but, with PCI, NIST, OWASP, and CIS offering different recommendations, what length is best?

    Read More Password Length: More than Just a Question of ComplianceContinue

  • Broadcast Attacks - Responder
    Exploits | How To | Password Cracking

    AD Series: How to Perform Broadcast Attacks Using NTLMRelayx, MiTM6 and Responder for Penetration Tests

    ByAndrew Trexler June 19, 2023June 16, 2025

    Andrew Trexler continues his AD Series with an in-depth tutorial on broadcast Attacks using NTLMRelayx, MiTM6 and Responder for penetration tests.

    Read More AD Series: How to Perform Broadcast Attacks Using NTLMRelayx, MiTM6 and Responder for Penetration TestsContinue

  • How to Create an Active Directory Test Environment
    How To | Networks | Password Cracking | Penetration Testing

    How to Create an AD Test Environment to Use for Penetration Testing

    ByAndrew Trexler April 27, 2023June 16, 2025

    Andrew Trexler walks us through creating a simple AD test environment to test new hacks before trying them on a penetration test.

    Read More How to Create an AD Test Environment to Use for Penetration TestingContinue

  • Raxis CTO, Brian Tant
    Password Cracking | Security Recommendations

    Understanding the Why Behind Password Management

    ByBonnie Smyre July 10, 2020

    In this video, Raxis CTO Brian Tant explains why password mismanagement is still one of the most reliable ways to breach a company network and what you can do to secure your network.

    Read More Understanding the Why Behind Password ManagementContinue

  • Raxis CTO, Brian Tant
    Password Cracking | Patching | Security Recommendations | Social Engineering

    3 Steps You Should Take Right Now to Reduce Your Risk of a Cyberattack

    ByBrian Tant June 22, 2020July 28, 2025

    In this video, Raxis CTO Brian Tant talks about three steps you should take to secure your network against hackers.

    Read More 3 Steps You Should Take Right Now to Reduce Your Risk of a CyberattackContinue

  • IKE VPNs Supporting Aggressive Mode
    Exploits | How To | Password Cracking

    IKE VPNs Supporting Aggressive Mode

    ByBonnie Smyre May 23, 2018

    In this post we’ll look at why IKE VPNs with Aggressive Mode enabled continue to be a vulnerability, how it can be exploited, and how to mitigate this risk.

    Read More IKE VPNs Supporting Aggressive ModeContinue

  • Fingerprint on keyboard
    Exploits | How To | Password Cracking | Tips For Everyone

    The Weakest Link in the Password Hash

    ByBrad Herring October 16, 2016

    Raxis VP of Business Development explains easy rules to use to make your passwords more secure and harder for hackers to crack.

    Read More The Weakest Link in the Password HashContinue

  • Data Breach, Cyber Attack, Protection Failed, System Safety Compromised
    Exploits | How To | Password Cracking

    HP iLO Password Cracking

    ByMark Puckett November 28, 2014

    Raxis CEO Mark Puckett shows how simple and fast it is for a hacker to crack a weak HP iLO password hash.

    Read More HP iLO Password CrackingContinue

2870 Peachtree Road
Suite #915-8924
Atlanta, GA 30305 USA

Contact us online

About Raxis

  • About Raxis
  • Careers
  • Terms and Conditions
  • Privacy Policy
  • Partners, Apply Here

Resources

  • The Exploit
  • Transporter Remote Penetration Testing
  • Penetration Test Glossary
  • What is a Penetration Test?
Facebook X Instagram Linkedin YouTube