Networks

Blog Archive Category

the exploit blog logo
The Exploit: Penetration Testing Insights From The Frontlines

The Exploit articles categorized as Networks

  • Cool Tools Series: Nuclei

    Cool Tools Series: Nuclei for Penetration Tests

    By Andrew Trexler Raxis’ Andrew Trexler shows how useful Nuclei is for network and application penetration tests, discovering vulnerabilities such as default passwords and more. September 10, 2024
  • Cool Tools Series: NMAP for Penetration Tests

    Cool Tools Series: NMAP for Penetration Tests

    By Adam Fernandez Raxis’ lead developer, Adam Fernandez, adds to our Cool Tools Series with a focus on Nmap: discovering live hosts that appear to be down and useful NSE scripts. July 30, 2024
  • Cool Tools Series: Host Discovery

    Cool Tools Series: Host Discovery in Penetration Testing

    By Scottie Cole Raxis’ pentester, Scottie Cole, leads off our new Cool Tools Series with tips on tools for host discovery and vulnerability discovery for penetration tests. July 2, 2024
  • How to Create an Active Directory Test Environment

    How to Create an AD Test Environment to Use for Penetration Testing

    By Andrew Trexler Andrew Trexler walks us through creating a simple AD test environment to test new hacks before trying them on a penetration test. April 27, 2023
  • Laptop with VPN on

    Notes From a Hacker: Yes, You Have to Use Your VPN – and Here’s Why

    By Brian Tant Raxis CTO Brian Tant discusses how VPNs protect our most critical data and why your company should require a VPN for remote access. May 1, 2020
  • Goodies for Hoodies: TCP Timestamps

    Goodies for Hoodies: TCP Timestamps

    By Brian Tant Does your penetration test always return a low-risk finding about TCP Timestamps? Why worry about it? Because it gives hackers info to use in other attacks. June 4, 2018