Skip to content
Raxis
  • Home
  • Services
      Red Team Penetration Testing
    • Red Team
    • Breach and Attack Simulation
    • Phishing and Spear Phishing
    • Physical Penetration Testing
    • Penetration Testing
    • Penetration Testing Services
    • Raxis Attack: PTaaS
    • Raxis Strike: Penetration Test
    • Web Application Penetration Testing
    • API Security
    • Salesforce Applications
    • Internal Networks, Cloud, and VPC
    • External Networks and Internet
    • Wireless Networks
    • Mobile Applications
    • Cybersecurity Services
    • Elite Cybersecurity Services
    • Attack Surface Management
    • Cybersecurity Code Review
  • Industries
      Critical Infrastructure
    • Energy
    • Communications
    • Transportation
    • Water
    • Compliance Driven
    • Credit Card Industry (PCI)
    • Healthcare (HIPAA, FDA)
    • SOC 2
    • Education
    • Finance and Banking
    • GLBA Safeguards Rule
    • Government Agencies
    • Manufacturing
    • Technology
    • Technology and Software Development
    • Blockchain and Cryptocurrency
    • Media and Entertainment
    • Social Media
  • Resources
      Company Information
    • About Raxis
    • Become a Raxis Partner
    • Careers
    • Certifications
    • Meet Our Team
    • Signup for Raxis News
    • Resources
    • The Exploit Blog
    • Raxis One
    • Red, Blue, and Purple Teams
    • Penetration Test Glossary
    • Transporter Remote Pentesting
    • What is a Penetration Test?
  • The Exploit Blog
  • About Us
Contact Raxis Login
Raxis
Contact RaxisIcon Link to Contact Raxis
  • Home
  • Services
      Red Team Penetration Testing
    • Red Team
    • Breach and Attack Simulation
    • Phishing and Spear Phishing
    • Physical Penetration Testing
    • Penetration Testing
    • Penetration Testing Services
    • Raxis Attack: PTaaS
    • Raxis Strike: Penetration Test
    • Web Application Penetration Testing
    • API Security
    • Salesforce Applications
    • Internal Networks, Cloud, and VPC
    • External Networks and Internet
    • Wireless Networks
    • Mobile Applications
    • Cybersecurity Services
    • Elite Cybersecurity Services
    • Attack Surface Management
    • Cybersecurity Code Review
  • Industries
      Critical Infrastructure
    • Energy
    • Communications
    • Transportation
    • Water
    • Compliance Driven
    • Credit Card Industry (PCI)
    • Healthcare (HIPAA, FDA)
    • SOC 2
    • Education
    • Finance and Banking
    • GLBA Safeguards Rule
    • Government Agencies
    • Manufacturing
    • Technology
    • Technology and Software Development
    • Blockchain and Cryptocurrency
    • Media and Entertainment
    • Social Media
  • Resources
      Company Information
    • About Raxis
    • Become a Raxis Partner
    • Careers
    • Certifications
    • Meet Our Team
    • Signup for Raxis News
    • Resources
    • The Exploit Blog
    • Raxis One
    • Red, Blue, and Purple Teams
    • Penetration Test Glossary
    • Transporter Remote Pentesting
    • What is a Penetration Test?
  • The Exploit Blog
  • About Us

Cybersecurity Insights From The Frontlines

  • Data Theft Exploit: DNS Exfiltration Attack
    Exploits | How To | Networks | Penetration Testing | Red Team

    Data Theft Exploit Part 2: DNS Exfiltration Attack

    ByJason Taylor January 13, 2026November 14, 2025

    Raxis’ Jason Taylor is back with a detailed tutorial on performing both manual and automated DNS exfiltration attacks for pentesting.

    Read More Data Theft Exploit Part 2: DNS Exfiltration AttackContinue

  • Why 8-Character Passwords Are No Longer Enough: Lessons from the Raxis Password Cracker
    In The News | Networks | Password Cracking | Penetration Testing | Security Recommendations

    Why 8-Character Passwords Are No Longer Enough: Lessons from the Raxis Password Cracker

    ByBrad Herring January 9, 2026January 7, 2026

    With the start of 2026, the Raxis team is already busy. A new upgrade to our password-cracking system shows how quickly 8-character passwords can be cracked.

    Read More Why 8-Character Passwords Are No Longer Enough: Lessons from the Raxis Password CrackerContinue

  • Data Theft Exploit: DNS Exfiltration Setup
    Exploits | How To | Networks | Penetration Testing | Red Team

    Data Theft Exploit Part 1: DNS Exfiltration Setup

    ByJason Taylor December 16, 2025November 14, 2025

    Raxis Lead Penetration Tester Jason Taylor’s in-depth tutorial explains setting up a server for DNS exfiltration. Check back next month to run the attack.

    Read More Data Theft Exploit Part 1: DNS Exfiltration SetupContinue

  • Windows Kills Common Offline/Account-less Install Method
    In The News | Networks

    Windows Kills Common Offline/Account-less Install Method

    ByRyan Chaplin October 17, 2025October 21, 2025

    Microsoft Windows recently announced the removal of local-only installs on Windows 11. Raxis’ Ryan Chaplin looks at concerns and possible options.

    Read More Windows Kills Common Offline/Account-less Install MethodContinue

  • Cool Tools Series: Kerbrute
    Exploits | Networks | Penetration Testing | Red Team

    Cool Tools Series: Kerbrute

    ByAndrew Trexler October 7, 2025September 3, 2025

    Raxis Principal Penetration Tester Andrew Trexler walks through the many uses of Kerbrute from user enumeration to brute-forcing and password spraying.

    Read More Cool Tools Series: KerbruteContinue

  • Lateral Movement: From Beachhead to Breach
    Exploits | How To | Networks | Penetration Testing | Security Recommendations

    Lateral Movement: From Beachhead to Breach

    ByNate Jernigan September 23, 2025August 21, 2025

    Raxis Senior Penetration Tester Nate Jernigan discusses lateral movement in penetration testing and the methods and tools he uses when performing these attacks.

    Read More Lateral Movement: From Beachhead to BreachContinue

  • Lessons from the DaVita Healthcare Ransomware Attack
    In The News | Networks | Penetration Testing | Security Recommendations | Social Engineering

    Lessons from the DaVita Healthcare Ransomware Attack

    ByBrian Tant September 18, 2025September 15, 2025

    The DaVita ransomware attack is one of the most impactful recent healthcare breaches. Learn what happened and what could have been done to limit the impact.

    Read More Lessons from the DaVita Healthcare Ransomware AttackContinue

  • Cool Tools Series: Croc
    How To | Networks

    Cool Tools Series: Croc for Secure Data Exfiltration

    ByNathan Anderson September 9, 2025August 14, 2025

    Lead Penetration Tester Nathan Anderson provides tips on using croc for secure data exfiltration just like he does on red team engagements.

    Read More Cool Tools Series: Croc for Secure Data ExfiltrationContinue

  • Cool Tools Series: Nuclei
    Exploits | How To | Networks | Penetration Testing

    Cool Tools Series: Nuclei for Penetration Tests

    ByAndrew Trexler September 10, 2024August 19, 2025

    Raxis’ Andrew Trexler shows how useful Nuclei is for network and application penetration tests, discovering vulnerabilities such as default passwords and more.

    Read More Cool Tools Series: Nuclei for Penetration TestsContinue

  • Cool Tools Series: NMAP for Penetration Tests
    How To | Networks | Penetration Testing

    Cool Tools Series: NMAP for Penetration Tests

    ByAdam Fernandez July 30, 2024

    Raxis’ lead developer, Adam Fernandez, adds to our Cool Tools Series with a focus on Nmap: discovering live hosts that appear to be down and useful NSE scripts.

    Read More Cool Tools Series: NMAP for Penetration TestsContinue

  • Cool Tools Series: Host Discovery
    How To | Networks | Penetration Testing

    Cool Tools Series: Host Discovery in Penetration Testing

    ByScottie Cole July 2, 2024June 16, 2025

    Raxis’ pentester, Scottie Cole, leads off our new Cool Tools Series with tips on tools for host discovery and vulnerability discovery for penetration tests.

    Read More Cool Tools Series: Host Discovery in Penetration TestingContinue

  • How to Create an Active Directory Test Environment
    How To | Networks | Password Cracking | Penetration Testing

    How to Create an AD Test Environment to Use for Penetration Testing

    ByAndrew Trexler April 27, 2023June 16, 2025

    Andrew Trexler walks us through creating a simple AD test environment to test new hacks before trying them on a penetration test.

    Read More How to Create an AD Test Environment to Use for Penetration TestingContinue

Page navigation

1 2 Next PageNext

2870 Peachtree Road
Suite #915-8924
Atlanta, GA 30305 USA

+1 678.421.4544

Contact us online for faster response

About Raxis

  • About Raxis
  • Careers
  • Terms and Conditions
  • Privacy Policy
  • Penetration Testing Partner Program

Resources

  • The Exploit Blog
  • Transporter Remote Penetration Testing
  • Penetration Test Glossary
  • What is a Penetration Test?
Facebook X Instagram Linkedin YouTube