Category: Networks
-
How to Create an AD Test Environment
This post will show you how to setup a simple Active Directory (AD) test environment. Further posts in the series will show how to use this environment to test hacking exploits.
-
Notes From a Hacker: Yes, You Have to Use Your VPN – and Here’s Why
Raxis CTO Brian Tant discusses how VPNs protect our most critical data and why your company should require a VPN for remote access.
-
Goodies for Hoodies: TCP Timestamps
Does your pentest always return a low-risk finding about TCP Timestamps? Why worry about that? Because it gives hackers info they can use in other attacks… and because it’s not as hard to fix as you think. Raxis’ VP of Engineering Brian Tant explains more here.