Penetration Testing

Blog Archive Category

the exploit blog logo
The Exploit: Penetration Testing Insights From The Frontlines

The Exploit articles categorized as Penetration Testing

  • Cool Tools Series: Kerbrute

    Cool Tools Series: Kerbrute

    By Andrew Trexler Raxis Principal Penetration Tester Andrew Trexler walks through the many uses of Kerbrute from user enumeration to brute-forcing and password spraying. October 7, 2025
  • Lateral Movement: From Beachhead to Breach

    Lateral Movement: From Beachhead to Breach

    By Nate Jernigan Raxis Senior Penetration Tester Nate Jernigan discusses lateral movement in penetration testing and the methods and tools he uses when performing these attacks. September 23, 2025
  • Lessons from the DaVita Healthcare Ransomware Attack

    Lessons from the DaVita Healthcare Ransomware Attack

    By Brian Tant The DaVita ransomware attack is one of the most impactful recent healthcare breaches. Learn what happened and what could have been done to limit the impact. September 18, 2025
  • Dangers of Storing Sensitive Data in Web Storage: 5 Real Attack Scenarios

    Dangers of Storing Sensitive Data in Web Storage: 5 Real Attack Scenarios

    By Ryan Chaplin Lead Penetration Tester Ryan Chaplin walks us through 5 real-world attack scenarios used in real-world penetration tests by Raxis. August 26, 2025
  • Raxis Sales Team Meeting Customer Needs

    Specialized Services: The Answer to Your Custom Cybersecurity Needs

    By Caroline Kelly We love to hear that our cybersecurity services have been useful to our customers. See how a specialized device test was just that and how we can help you too. August 21, 2025
  • Raspberry Pi

    Raspberry Pi Planted in Failed ATM Heist

    By Brian Tant Raxis CTO Brian Tant discusses the Raspberry Pi used in a recent ATM heist and how Raxis uses the same type of device in our pentesting. August 14, 2025