Skip to content
Raxis
  • Home
  • Services
      Red Team Penetration Testing
    • Red Team
    • Breach and Attack Simulation
    • Phishing and Spear Phishing
    • Physical Penetration Testing
    • Penetration Testing
    • Penetration Testing Services
    • Raxis Attack: PTaaS
    • Raxis Strike: Penetration Test
    • Web Application Penetration Testing
    • API Security
    • Salesforce Applications
    • Internal Networks, Cloud, and VPC
    • External Networks and Internet
    • Wireless Networks
    • Mobile Applications
    • Cybersecurity Services
    • Elite Cybersecurity Services
    • Attack Surface Management
    • Cybersecurity Code Review
  • Industries
      Critical Infrastructure
    • Energy
    • Communications
    • Transportation
    • Water
    • Compliance Driven
    • Credit Card Industry (PCI)
    • Healthcare (HIPAA, FDA)
    • SOC 2
    • Education
    • Finance and Banking
    • GLBA Safeguards Rule
    • Government Agencies
    • Manufacturing
    • Technology
    • Technology and Software Development
    • Blockchain and Cryptocurrency
    • Media and Entertainment
    • Social Media
  • Resources
      Company Information
    • About Raxis
    • Become a Raxis Partner
    • Careers
    • Certifications
    • Meet Our Team
    • Signup for Raxis News
    • Resources
    • The Exploit Blog
    • Raxis One
    • Red, Blue, and Purple Teams
    • Penetration Test Glossary
    • Transporter Remote Pentesting
    • What is a Penetration Test?
  • The Exploit Blog
  • About Us
Contact Raxis Login
Raxis
Contact RaxisIcon Link to Contact Raxis
  • Home
  • Services
      Red Team Penetration Testing
    • Red Team
    • Breach and Attack Simulation
    • Phishing and Spear Phishing
    • Physical Penetration Testing
    • Penetration Testing
    • Penetration Testing Services
    • Raxis Attack: PTaaS
    • Raxis Strike: Penetration Test
    • Web Application Penetration Testing
    • API Security
    • Salesforce Applications
    • Internal Networks, Cloud, and VPC
    • External Networks and Internet
    • Wireless Networks
    • Mobile Applications
    • Cybersecurity Services
    • Elite Cybersecurity Services
    • Attack Surface Management
    • Cybersecurity Code Review
  • Industries
      Critical Infrastructure
    • Energy
    • Communications
    • Transportation
    • Water
    • Compliance Driven
    • Credit Card Industry (PCI)
    • Healthcare (HIPAA, FDA)
    • SOC 2
    • Education
    • Finance and Banking
    • GLBA Safeguards Rule
    • Government Agencies
    • Manufacturing
    • Technology
    • Technology and Software Development
    • Blockchain and Cryptocurrency
    • Media and Entertainment
    • Social Media
  • Resources
      Company Information
    • About Raxis
    • Become a Raxis Partner
    • Careers
    • Certifications
    • Meet Our Team
    • Signup for Raxis News
    • Resources
    • The Exploit Blog
    • Raxis One
    • Red, Blue, and Purple Teams
    • Penetration Test Glossary
    • Transporter Remote Pentesting
    • What is a Penetration Test?
  • The Exploit Blog
  • About Us

Cybersecurity Insights From The Frontlines

  • Data Theft Exploit: DNS Exfiltration Attack
    Exploits | How To | Networks | Penetration Testing | Red Team

    Data Theft Exploit Part 2: DNS Exfiltration Attack

    ByJason Taylor January 13, 2026November 14, 2025

    Raxis’ Jason Taylor is back with a detailed tutorial on performing both manual and automated DNS exfiltration attacks for pentesting.

    Read More Data Theft Exploit Part 2: DNS Exfiltration AttackContinue

  • Cross-Site Scripting (XSS): Cookie Theft - Advanced Payloads
    Exploits | How To | Web Apps

    Cross-Site Scripting (XSS): Cookie Theft – Advanced Payloads

    ByRaxis Research Team December 18, 2025November 21, 2025

    We reached into our vaults to bring you the final video in our cross-site scripting (XSS) series. Learn about cookie theft, website defacement, and CSRF attacks.

    Read More Cross-Site Scripting (XSS): Cookie Theft – Advanced PayloadsContinue

  • Data Theft Exploit: DNS Exfiltration Setup
    Exploits | How To | Networks | Penetration Testing | Red Team

    Data Theft Exploit Part 1: DNS Exfiltration Setup

    ByJason Taylor December 16, 2025November 14, 2025

    Raxis Lead Penetration Tester Jason Taylor’s in-depth tutorial explains setting up a server for DNS exfiltration. Check back next month to run the attack.

    Read More Data Theft Exploit Part 1: DNS Exfiltration SetupContinue

  • PSE & Red Team Series: Badge Cloning
    How To | Red Team | Social Engineering

    PSE & Red Team Series: Badge Cloning

    ByNathan Anderson October 21, 2025September 15, 2025

    Lead Penetration Tester Nathan Anderson is back with more PSE and red team advice, this time looking into three tools he uses to clone badges and gain access.

    Read More PSE & Red Team Series: Badge CloningContinue

  • Lateral Movement: From Beachhead to Breach
    Exploits | How To | Networks | Penetration Testing | Security Recommendations

    Lateral Movement: From Beachhead to Breach

    ByNate Jernigan September 23, 2025August 21, 2025

    Raxis Senior Penetration Tester Nate Jernigan discusses lateral movement in penetration testing and the methods and tools he uses when performing these attacks.

    Read More Lateral Movement: From Beachhead to BreachContinue

  • Cool Tools Series: Croc
    How To | Networks

    Cool Tools Series: Croc for Secure Data Exfiltration

    ByNathan Anderson September 9, 2025August 14, 2025

    Lead Penetration Tester Nathan Anderson provides tips on using croc for secure data exfiltration just like he does on red team engagements.

    Read More Cool Tools Series: Croc for Secure Data ExfiltrationContinue

  • PSE & Red Team Series: The Power of Grip to Enhance the Under-Door Tool
    How To | Red Team | Social Engineering

    PSE & Red Team Series: The Power of Grip to Enhance the Under-Door Tool

    ByBrad Herring August 12, 2025May 29, 2025

    In this next post in our PSE and Red Team Series, Brad Herring explains how to use gaffer’s tape or heat-shrink tubing to make an under-door tool easier to use.

    Read More PSE & Red Team Series: The Power of Grip to Enhance the Under-Door ToolContinue

  • Wireless Series: Using Wifite to Capture and Crack a WPA2 Pre-Shared Key
    How To | Password Cracking | Penetration Testing | Wireless

    Wireless Series: Using Wifite to Capture and Crack a WPA2 Pre-Shared Key for Penetration Testing

    ByScottie Cole June 17, 2025June 18, 2025

    Principal Penetration Tester Scottie Cole begins our wireless penetration testing series with capturing and cracking a WPA2 Pre-Shared Key using Wifite.

    Read More Wireless Series: Using Wifite to Capture and Crack a WPA2 Pre-Shared Key for Penetration TestingContinue

  • Jailbreak Journey: Transforming an iPad for Mobile App Penetration Testing
    Exploits | How To | Mobile Apps

    Jailbreak Journey: Transforming an iPad for Mobile App Penetration Testing

    ByJason Taylor June 3, 2025November 4, 2025

    Lead Penetration Tester Jason Taylor takes us step-by-step through jailbreaking an iPad 7 for use in penetration testing.

    Read More Jailbreak Journey: Transforming an iPad for Mobile App Penetration TestingContinue

  • PSE & Red Team Series: Physical Entry Bypass
    How To | Red Team | Social Engineering

    PSE & Red Team Series: Physical Entry Bypass

    ByNathan Anderson April 8, 2025September 4, 2025

    Raxis lead penetration tester, Nathan Anderson, continues our PSE & Red Team series with a discussion on the tools and techniques to bypass entry controls.

    Read More PSE & Red Team Series: Physical Entry BypassContinue

  • Cool Tools Series: CeWL
    How To | Password Cracking

    Cool Tools Series: CeWL for Penetration Testing

    ByJason Taylor March 25, 2025August 19, 2025

    Lead Penetration Tester Jason Taylor discusses how the CeWL Custom Word List generator can improve hashcat results for penetration testing.

    Read More Cool Tools Series: CeWL for Penetration TestingContinue

  • AD Series: Using Evil-WinRM to Get NTDS Manually
    Exploits | How To

    AD Series: Using Evil-WinRM to Get NTDS Manually in Penetration Tests

    ByAndrew Trexler March 11, 2025August 19, 2025

    Principal Penetration Tester Andrew Trexler’s Active Directory series is back, showing how to use Evil-WinRM to copy NTDS.dit manually in penetration tests.

    Read More AD Series: Using Evil-WinRM to Get NTDS Manually in Penetration TestsContinue

Page navigation

1 2 3 … 5 Next PageNext

2870 Peachtree Road
Suite #915-8924
Atlanta, GA 30305 USA

+1 678.421.4544

Contact us online for faster response

About Raxis

  • About Raxis
  • Careers
  • Terms and Conditions
  • Privacy Policy
  • Penetration Testing Partner Program

Resources

  • The Exploit Blog
  • Transporter Remote Penetration Testing
  • Penetration Test Glossary
  • What is a Penetration Test?
Facebook X Instagram Linkedin YouTube