Skip to content
Raxis
  • Home
  • Services
      Red Team Penetration Testing
    • Red Team
    • Breach and Attack Simulation
    • Phishing and Spear Phishing
    • Physical Penetration Testing
    • Penetration Testing
    • Penetration Testing Services
    • Raxis Attack: PTaaS
    • Raxis Strike: Penetration Test
    • Web Application Penetration Testing
    • API Security
    • Salesforce Applications
    • Internal Networks, Cloud, and VPC
    • External Networks and Internet
    • Wireless Networks
    • Mobile Applications
    • Cybersecurity Services
    • Elite Cybersecurity Services
    • Attack Surface Management
    • Cybersecurity Code Review
  • Industries
      Critical Infrastructure
    • Energy
    • Communications
    • Transportation
    • Water
    • Compliance Driven
    • Credit Card Industry (PCI)
    • Healthcare (HIPAA, FDA)
    • SOC 2
    • Education
    • Finance and Banking
    • GLBA Safeguards Rule
    • Government Agencies
    • Manufacturing
    • Technology
    • Technology and Software Development
    • Blockchain and Cryptocurrency
    • Media and Entertainment
    • Social Media
  • Resources
      Company Information
    • About Raxis
    • Become a Raxis Partner
    • Careers
    • Certifications
    • Meet Our Team
    • Signup for Raxis News
    • Resources
    • The Exploit Blog
    • Raxis One
    • Red, Blue, and Purple Teams
    • Penetration Test Glossary
    • Transporter Remote Pentesting
    • What is a Penetration Test?
  • The Exploit Blog
  • About Us
Contact Raxis Login
Raxis
Contact RaxisIcon Link to Contact Raxis
  • Home
  • Services
      Red Team Penetration Testing
    • Red Team
    • Breach and Attack Simulation
    • Phishing and Spear Phishing
    • Physical Penetration Testing
    • Penetration Testing
    • Penetration Testing Services
    • Raxis Attack: PTaaS
    • Raxis Strike: Penetration Test
    • Web Application Penetration Testing
    • API Security
    • Salesforce Applications
    • Internal Networks, Cloud, and VPC
    • External Networks and Internet
    • Wireless Networks
    • Mobile Applications
    • Cybersecurity Services
    • Elite Cybersecurity Services
    • Attack Surface Management
    • Cybersecurity Code Review
  • Industries
      Critical Infrastructure
    • Energy
    • Communications
    • Transportation
    • Water
    • Compliance Driven
    • Credit Card Industry (PCI)
    • Healthcare (HIPAA, FDA)
    • SOC 2
    • Education
    • Finance and Banking
    • GLBA Safeguards Rule
    • Government Agencies
    • Manufacturing
    • Technology
    • Technology and Software Development
    • Blockchain and Cryptocurrency
    • Media and Entertainment
    • Social Media
  • Resources
      Company Information
    • About Raxis
    • Become a Raxis Partner
    • Careers
    • Certifications
    • Meet Our Team
    • Signup for Raxis News
    • Resources
    • The Exploit Blog
    • Raxis One
    • Red, Blue, and Purple Teams
    • Penetration Test Glossary
    • Transporter Remote Pentesting
    • What is a Penetration Test?
  • The Exploit Blog
  • About Us

Cybersecurity Insights From The Frontlines

  • Raspberry Pi
    Exploits | Penetration Testing | Red Team

    Raspberry Pi Planted in Failed ATM Heist

    ByBrian Tant August 14, 2025September 2, 2025

    Raxis Chief Penetration Tester Brian Tant discusses the Raspberry Pi used in a recent ATM heist and how Raxis uses the same type of device in our pentesting.

    Read More Raspberry Pi Planted in Failed ATM HeistContinue

  • Choosing a Penetration Testing Company: Part 3
    Choosing a Penetration Testing Company | Penetration Testing | PTaaS | Security Recommendations

    Choosing a Penetration Testing Company: Part 3

    ByCaroline Kelly July 29, 2025September 2, 2025

    Caroline Kelly concludes our three-part “Choosing a Penetration Testing Company” series with how Penetration Testing as a Service (PTaaS) provides great value.

    Read More Choosing a Penetration Testing Company: Part 3Continue

  • OWASP Top 10 for LLM Applications
    AI | Exploits | Penetration Testing | Web Apps

    OWASP Top 10 for LLM Applications Penetration Testing

    ByJason Taylor July 15, 2025November 10, 2025

    Lead Penetration Tester Jason Taylor looks at OWASP’s Top 10 list for LLM applications for penetration testing as AI machine learning becomes prevalent.

    Read More OWASP Top 10 for LLM Applications Penetration TestingContinue

  • Choosing a Penetration Testing Company: Part 2
    Choosing a Penetration Testing Company | Penetration Testing | PTaaS | Security Recommendations

    Choosing a Penetration Testing Company: Part 2

    ByBrad Herring July 1, 2025September 2, 2025

    Brad Herring continues our three-part “Choosing a Penetration Testing Company” series with a look at the factors to consider when choosing the best vendor.

    Read More Choosing a Penetration Testing Company: Part 2Continue

  • Wireless Series: Using Wifite to Capture and Crack a WPA2 Pre-Shared Key
    How To | Password Cracking | Penetration Testing | Wireless

    Wireless Series: Using Wifite to Capture and Crack a WPA2 Pre-Shared Key for Penetration Testing

    ByScottie Cole June 17, 2025June 18, 2025

    Principal Penetration Tester Scottie Cole begins our wireless penetration testing series with capturing and cracking a WPA2 Pre-Shared Key using Wifite.

    Read More Wireless Series: Using Wifite to Capture and Crack a WPA2 Pre-Shared Key for Penetration TestingContinue

  • Choosing a Penetration Testing Company: Part 1
    Choosing a Penetration Testing Company | Penetration Testing | PTaaS | Security Recommendations

    Choosing a Penetration Testing Company: Part 1

    ByCole Stafford April 22, 2025September 2, 2025

    Cole Stafford starts our three-part “Choosing a Penetration Testing Company” series by looking at what penetration testing is and the types of penetration tests.

    Read More Choosing a Penetration Testing Company: Part 1Continue

  • Understanding PTaaS: Penetration Testing as a Service
    Penetration Testing | PTaaS | Security Recommendations

    Understanding PTaaS: Penetration Testing as a Service

    ByBonnie Smyre March 5, 2025March 6, 2025

    What does Penetration Testing as a Service (PTaaS) really mean? In this blog we discuss the details and how do you find the best PTaaS for your organization.

    Read More Understanding PTaaS: Penetration Testing as a ServiceContinue

  • Password Series: 8 Practical First Steps to Crack Difficult Passwords
    How To | Password Cracking | Penetration Testing

    Password Series: 8 Practical First Steps to Crack Difficult Passwords in Penetration Tests

    ByRyan Chaplin February 25, 2025August 19, 2025

    From rulesets & hardware to wordlists and mask attacks, Lead Penetration Tester Ryan Chaplin shows how to crack difficult password hashes in penetration tests.

    Read More Password Series: 8 Practical First Steps to Crack Difficult Passwords in Penetration TestsContinue

  • Tips for Scoping Your Penetration Test
    Penetration Testing

    Tips for Scoping Your Penetration Test

    ByBrad Herring January 28, 2025June 24, 2025

    Scoping your penetration test (especially your first one) can be daunting. Our team is always happy to help, and Brad Herring gives you a head start here.

    Read More Tips for Scoping Your Penetration TestContinue

  • Cool Tools Series: Vim
    How To | Penetration Testing

    Cool Tools Series: How Vim Powers Penetration Testing

    ByAndrew Trexler January 14, 2025August 17, 2025

    Principal Penetration Tester, Andrew Trexler, dives into Vim, a powerful command line tool for text files, and shows useful commands for penetration testing.

    Read More Cool Tools Series: How Vim Powers Penetration TestingContinue

  • Accepting Penetration Test Risks & How Compensating Controls Can Help
    Penetration Testing | Security Recommendations

    Accepting Penetration Test Risks & How Compensating Controls Can Help

    ByTim Semchenko December 17, 2024

    Tim Semchenko discusses documenting acceptance of risks and implementing compensating controls as options when pentest findings cannot be fixed immediately.

    Read More Accepting Penetration Test Risks & How Compensating Controls Can HelpContinue

  • Cool Tools Series: Masscan
    How To | Penetration Testing

    Cool Tools Series: Masscan for Penetration Testing

    ByAndrew Trexler December 3, 2024June 16, 2025

    Continuing our Cool Tools Series, Lead Penetration Tester Andrew Trexler shows how to use masscan for discovery scanning on large networks in penetration tests.

    Read More Cool Tools Series: Masscan for Penetration TestingContinue

Page navigation

Previous PagePrevious 1 2 3 4 5 Next PageNext

2870 Peachtree Road
Suite #915-8924
Atlanta, GA 30305 USA

+1 678.421.4544

Contact us online for faster response

About Raxis

  • About Raxis
  • Careers
  • Terms and Conditions
  • Privacy Policy
  • Penetration Testing Partner Program

Resources

  • The Exploit Blog
  • Transporter Remote Penetration Testing
  • Penetration Test Glossary
  • What is a Penetration Test?
Facebook X Instagram Linkedin YouTube