Raxis Blog Posts by Category

, , ,
  • Cool Tools Series: Nuclei
    Cool Tools Series: Nuclei for Penetration Tests
    Raxis’ Andrew Trexler shows how useful Nuclei is for network and application penetration tests, discovering vulnerabilities such as default passwords and more.
  • Cool Tools Series: NMAP for Penetration Tests
    Cool Tools Series: NMAP for Penetration Tests
    Raxis’ lead developer, Adam Fernandez, adds to our Cool Tools Series with a focus on Nmap: discovering live hosts that appear to be down and useful NSE scripts.
  • Cool Tools Series: Host Discovery
    Cool Tools Series: Host Discovery in Penetration Testing
    Raxis’ pentester, Scottie Cole, leads off our new Cool Tools Series with tips on tools for host discovery and vulnerability discovery for penetration tests.
  • How to Create an Active Directory Test Environment
    How to Create an AD Test Environment to Use for Penetration Testing
    Andrew Trexler walks us through creating a simple AD test environment to test new hacks before trying them on a penetration test.
  • Laptop with VPN on
    Notes From a Hacker: Yes, You Have to Use Your VPN – and Here’s Why
    Raxis CTO Brian Tant discusses how VPNs protect our most critical data and why your company should require a VPN for remote access.
  • Goodies for Hoodies: TCP Timestamps
    Goodies for Hoodies: TCP Timestamps
    Does your penetration test always return a low-risk finding about TCP Timestamps? Why worry about it? Because it gives hackers info to use in other attacks.