Skip to content
Raxis
  • Home
  • Services
      Core Services
    • Raxis Red Team
    • AI Augmented Penetration Testing
    • Penetration Testing as a Service (PTaaS)
    • Elite Cybersecurity Services
    • Raxis listed as a Sample Vendor for Penetration Testing as a Service in two Gartner® Hype Cycle™, 2024 reports
    • Penetration Testing
    • Penetration Testing Services
    • Web Application Penetration Testing
    • API Security
    • Salesforce Applications
    • Internal Networks, Cloud, and VPC
    • External Networks and Internet
    • Wireless Networks
    • Mobile Applications
    • CyberSecurity Services
    • Compliance: PCI, HIPAA, GLBA, and more
    • Attack Surface Management
    • Breach and Attack Simulation
    • Cybersecurity Code Review
    • Cybersecurity Red Team
    • Phishing and Spear Phishing
    • Social Engineering
  • Industries
      Critical Infrastructure
    • Energy
    • Communications
    • Transportation
    • Water
    • Compliance Driven
    • Credit Card Industry (PCI)
    • Education
    • Finance and Banking
    • GLBA Safeguards Rule
    • Government Agencies
    • Healthcare (HIPAA)
    • Manufacturing
    • SOC 2
    • Technology
    • Technology and Software Development
    • Blockchain and Cryptocurrency
    • Media and Entertainment
    • Social Media
  • Resources
      Company Information
    • About Raxis
    • Careers
    • Meet Our Team
    • Signup for Raxis News
    • Resources
    • The Exploit Blog
    • Become a Raxis Partner
    • Certifications
    • Raxis One
    • Transporter Remote Pentesting
    • About Ethical Hacking
    • An Inside Look at a Raxis Red Team
    • Red, Blue, and Purple Teams
    • Penetration Test Glossary
    • What is a Penetration Test?
    • What is Web Application Penetration Testing?
  • The Exploit Blog
  • About Us
Contact Raxis Login
Raxis
Contact RaxisIcon Link to Contact Raxis
  • Home
  • Services
      Core Services
    • Raxis Red Team
    • AI Augmented Penetration Testing
    • Penetration Testing as a Service (PTaaS)
    • Elite Cybersecurity Services
    • Raxis listed as a Sample Vendor for Penetration Testing as a Service in two Gartner® Hype Cycle™, 2024 reports
    • Penetration Testing
    • Penetration Testing Services
    • Web Application Penetration Testing
    • API Security
    • Salesforce Applications
    • Internal Networks, Cloud, and VPC
    • External Networks and Internet
    • Wireless Networks
    • Mobile Applications
    • CyberSecurity Services
    • Compliance: PCI, HIPAA, GLBA, and more
    • Attack Surface Management
    • Breach and Attack Simulation
    • Cybersecurity Code Review
    • Cybersecurity Red Team
    • Phishing and Spear Phishing
    • Social Engineering
  • Industries
      Critical Infrastructure
    • Energy
    • Communications
    • Transportation
    • Water
    • Compliance Driven
    • Credit Card Industry (PCI)
    • Education
    • Finance and Banking
    • GLBA Safeguards Rule
    • Government Agencies
    • Healthcare (HIPAA)
    • Manufacturing
    • SOC 2
    • Technology
    • Technology and Software Development
    • Blockchain and Cryptocurrency
    • Media and Entertainment
    • Social Media
  • Resources
      Company Information
    • About Raxis
    • Careers
    • Meet Our Team
    • Signup for Raxis News
    • Resources
    • The Exploit Blog
    • Become a Raxis Partner
    • Certifications
    • Raxis One
    • Transporter Remote Pentesting
    • About Ethical Hacking
    • An Inside Look at a Raxis Red Team
    • Red, Blue, and Purple Teams
    • Penetration Test Glossary
    • What is a Penetration Test?
    • What is Web Application Penetration Testing?
  • The Exploit Blog
  • About Us

The Exploit

Raxis Cybersecurity Insights From The Frontlines

  • Windows Kills Common Offline/Account-less Install Method
    In The News | Networks

    Windows Kills Common Offline/Account-less Install Method

    ByRyan Chaplin October 17, 2025October 21, 2025

    Microsoft Windows recently announced the removal of local-only installs on Windows 11. Raxis’ Ryan Chaplin looks at concerns and possible options.

    Read More Windows Kills Common Offline/Account-less Install MethodContinue

  • Cool Tools Series: Kerbrute
    Exploits | Networks | Penetration Testing | Red Team

    Cool Tools Series: Kerbrute

    ByAndrew Trexler October 7, 2025September 3, 2025

    Raxis Principal Penetration Tester Andrew Trexler walks through the many uses of Kerbrute from user enumeration to brute-forcing and password spraying.

    Read More Cool Tools Series: KerbruteContinue

  • Lateral Movement: From Beachhead to Breach
    Exploits | How To | Networks | Penetration Testing | Security Recommendations

    Lateral Movement: From Beachhead to Breach

    ByNate Jernigan September 23, 2025August 21, 2025

    Raxis Senior Penetration Tester Nate Jernigan discusses lateral movement in penetration testing and the methods and tools he uses when performing these attacks.

    Read More Lateral Movement: From Beachhead to BreachContinue

  • Lessons from the DaVita Healthcare Ransomware Attack
    In The News | Networks | Penetration Testing | Security Recommendations | Social Engineering

    Lessons from the DaVita Healthcare Ransomware Attack

    ByBrian Tant September 18, 2025September 15, 2025

    The DaVita ransomware attack is one of the most impactful recent healthcare breaches. Learn what happened and what could have been done to limit the impact.

    Read More Lessons from the DaVita Healthcare Ransomware AttackContinue

  • Cool Tools Series: Croc
    How To | Networks

    Cool Tools Series: Croc for Secure Data Exfiltration

    ByNathan Anderson September 9, 2025August 14, 2025

    Lead Penetration Tester Nathan Anderson provides tips on using croc for secure data exfiltration just like he does on red team engagements.

    Read More Cool Tools Series: Croc for Secure Data ExfiltrationContinue

  • Cool Tools Series: Nuclei
    Exploits | How To | Networks | Penetration Testing

    Cool Tools Series: Nuclei for Penetration Tests

    ByAndrew Trexler September 10, 2024August 19, 2025

    Raxis’ Andrew Trexler shows how useful Nuclei is for network and application penetration tests, discovering vulnerabilities such as default passwords and more.

    Read More Cool Tools Series: Nuclei for Penetration TestsContinue

  • Cool Tools Series: NMAP for Penetration Tests
    How To | Networks | Penetration Testing

    Cool Tools Series: NMAP for Penetration Tests

    ByAdam Fernandez July 30, 2024

    Raxis’ lead developer, Adam Fernandez, adds to our Cool Tools Series with a focus on Nmap: discovering live hosts that appear to be down and useful NSE scripts.

    Read More Cool Tools Series: NMAP for Penetration TestsContinue

  • Cool Tools Series: Host Discovery
    How To | Networks | Penetration Testing

    Cool Tools Series: Host Discovery in Penetration Testing

    ByScottie Cole July 2, 2024June 16, 2025

    Raxis’ pentester, Scottie Cole, leads off our new Cool Tools Series with tips on tools for host discovery and vulnerability discovery for penetration tests.

    Read More Cool Tools Series: Host Discovery in Penetration TestingContinue

  • How to Create an Active Directory Test Environment
    How To | Networks | Password Cracking | Penetration Testing

    How to Create an AD Test Environment to Use for Penetration Testing

    ByAndrew Trexler April 27, 2023June 16, 2025

    Andrew Trexler walks us through creating a simple AD test environment to test new hacks before trying them on a penetration test.

    Read More How to Create an AD Test Environment to Use for Penetration TestingContinue

  • Laptop with VPN on
    Networks | Security Recommendations | Tips For Everyone

    Notes From a Hacker: Yes, You Have to Use Your VPN – and Here’s Why

    ByBrian Tant May 1, 2020July 28, 2025

    Raxis CTO Brian Tant discusses how VPNs protect our most critical data and why your company should require a VPN for remote access.

    Read More Notes From a Hacker: Yes, You Have to Use Your VPN – and Here’s WhyContinue

  • Goodies for Hoodies: TCP Timestamps
    How To | Networks

    Goodies for Hoodies: TCP Timestamps

    ByBrian Tant June 4, 2018June 2, 2025

    Does your penetration test always return a low-risk finding about TCP Timestamps? Why worry about it? Because it gives hackers info to use in other attacks.

    Read More Goodies for Hoodies: TCP TimestampsContinue

2870 Peachtree Road
Suite #915-8924
Atlanta, GA 30305 USA

Contact us online

About Raxis

  • About Raxis
  • Careers
  • Terms and Conditions
  • Privacy Policy
  • Partners, Apply Here

Resources

  • The Exploit
  • Transporter Remote Penetration Testing
  • Penetration Test Glossary
  • What is a Penetration Test?
Facebook X Instagram Linkedin YouTube