Andrew Trexler walks us through creating a simple AD test environment to test new hacks[…]
Exploiting GraphQL, a query language inspired by the structure & functionality of online data storage[…]
Raxis demonstrates how to obtain a remote shell on a target system using a Log4j[…]
The Dirty Pipe vulnerability (CVE-2022-0847) allows any user to write to read-only files, including files[…]
In this post, Raxis VP Brad Herring explains how web proxy tools can turn even[…]
Raxis’ COO Bonnie Smyre continues her two-part series on how to hire a penetration testing
Raxis’ COO Bonnie Smyre offers some helpful hints about how to start the process of[…]
Raxis lead penetration tester Matt Dunn has developed three new tools to make it easier[…]
What’s it like to earn your OSCP? Raxis senior penetration tester Andrew Trexler talks about[…]
Raxis’ Matt Dunn has published another Metasploit module, this one describing a vulnerability in Azure’s[…]
In this second in a series, learn how to perform Cross-Site Scripting (XSS) attacks such[…]
This video covers the basics of cross-site scripting, including reflected, stored, and DOM-based XSS as[…]