How To

Blog Archive Category

the exploit blog logo
The Exploit: Penetration Testing Insights From The Frontlines

The Exploit articles categorized as How To

  • IKE VPNs Supporting Aggressive Mode

    IKE VPNs Supporting Aggressive Mode

    By Bonnie Smyre In this post we’ll look at why IKE VPNs with Aggressive Mode enabled continue to be a vulnerability, how it can be exploited, and how to mitigate this risk. May 23, 2018
  • Raxis API Tool

    Raxis API Tool

    By Bonnie Smyre Raxis Lead Developer, Adam Fernandez, has developed a tool to use for testing JSON-based REST APIs, and we’re sharing this tool on GitHub to help API developers test their own code during the SDLC process and to prepare for third-party API penetration tests. May 4, 2018
  • Fingerprint on keyboard

    The Weakest Link in the Password Hash

    By Brad Herring Raxis VP of Business Development explains easy rules to use to make your passwords more secure and harder for hackers to crack. October 16, 2016
  • Data Breach, Cyber Attack, Protection Failed, System Safety Compromised

    HP iLO Password Cracking

    By Mark Puckett Raxis CEO Mark Puckett shows how simple and fast it is for a hacker to crack a weak HP iLO password hash. November 28, 2014