Skip to content
Raxis
  • Home
  • Services
      Red Team Penetration Testing
    • Red Team
    • Breach and Attack Simulation
    • Phishing and Spear Phishing
    • Physical Penetration Testing
    • Raxis listed as a Sample Vendor for Penetration Testing as a Service in two Gartner® Hype Cycle™, 2023 and 2024 reports
    • Penetration Testing
    • Penetration Testing Services
    • Raxis Attack
    • Raxis Strike
    • Web Application Penetration Testing
    • API Security
    • Salesforce Applications
    • Internal Networks, Cloud, and VPC
    • External Networks and Internet
    • Wireless Networks
    • Mobile Applications
    • Cybersecurity Services
    • Elite Cybersecurity Services
    • Attack Surface Management
    • Cybersecurity Code Review
  • Industries
      Critical Infrastructure
    • Energy
    • Communications
    • Transportation
    • Water
    • Compliance Driven
    • Credit Card Industry (PCI)
    • Healthcare (HIPAA)
    • SOC 2
    • Education
    • Finance and Banking
    • GLBA Safeguards Rule
    • Government Agencies
    • Manufacturing
    • Technology
    • Technology and Software Development
    • Blockchain and Cryptocurrency
    • Media and Entertainment
    • Social Media
  • Resources
      Company Information
    • About Raxis
    • Become a Raxis Partner
    • Careers
    • Certifications
    • Meet Our Team
    • Signup for Raxis News
    • Resources
    • The Exploit Blog
    • Raxis One
    • Red, Blue, and Purple Teams
    • Penetration Test Glossary
    • Transporter Remote Pentesting
    • What is a Penetration Test?
  • The Exploit Blog
  • About Us
Contact Raxis Login
Raxis
Contact RaxisIcon Link to Contact Raxis
  • Home
  • Services
      Red Team Penetration Testing
    • Red Team
    • Breach and Attack Simulation
    • Phishing and Spear Phishing
    • Physical Penetration Testing
    • Raxis listed as a Sample Vendor for Penetration Testing as a Service in two Gartner® Hype Cycle™, 2023 and 2024 reports
    • Penetration Testing
    • Penetration Testing Services
    • Raxis Attack
    • Raxis Strike
    • Web Application Penetration Testing
    • API Security
    • Salesforce Applications
    • Internal Networks, Cloud, and VPC
    • External Networks and Internet
    • Wireless Networks
    • Mobile Applications
    • Cybersecurity Services
    • Elite Cybersecurity Services
    • Attack Surface Management
    • Cybersecurity Code Review
  • Industries
      Critical Infrastructure
    • Energy
    • Communications
    • Transportation
    • Water
    • Compliance Driven
    • Credit Card Industry (PCI)
    • Healthcare (HIPAA)
    • SOC 2
    • Education
    • Finance and Banking
    • GLBA Safeguards Rule
    • Government Agencies
    • Manufacturing
    • Technology
    • Technology and Software Development
    • Blockchain and Cryptocurrency
    • Media and Entertainment
    • Social Media
  • Resources
      Company Information
    • About Raxis
    • Become a Raxis Partner
    • Careers
    • Certifications
    • Meet Our Team
    • Signup for Raxis News
    • Resources
    • The Exploit Blog
    • Raxis One
    • Red, Blue, and Purple Teams
    • Penetration Test Glossary
    • Transporter Remote Pentesting
    • What is a Penetration Test?
  • The Exploit Blog
  • About Us
The Exploit Blog

Raxis Cybersecurity Insights From The Frontlines

  • Why 8-Character Passwords Are No Longer Enough: Lessons from the Raxis Password Cracker
    In The News | Networks | Password Cracking | Penetration Testing | Security Recommendations

    Why 8-Character Passwords Are No Longer Enough: Lessons from the Raxis Password Cracker

    ByBrad Herring January 9, 2026January 7, 2026

    With the start of 2026, the Raxis team is already busy. A new upgrade to our password-cracking system shows how quickly 8-character passwords can be cracked.

    Read More Why 8-Character Passwords Are No Longer Enough: Lessons from the Raxis Password CrackerContinue

  • Cool Tools Series: CeWL
    How To | Password Cracking

    Cool Tools Series: CeWL for Penetration Testing

    ByJason Taylor March 25, 2025August 19, 2025

    Lead Penetration Tester Jason Taylor discusses how the CeWL Custom Word List generator can improve hashcat results for penetration testing.

    Read More Cool Tools Series: CeWL for Penetration TestingContinue

  • Password Series: 8 Practical First Steps to Crack Difficult Passwords
    How To | Password Cracking | Penetration Testing

    Password Series: 8 Practical First Steps to Crack Difficult Passwords in Penetration Tests

    ByRyan Chaplin February 25, 2025August 19, 2025

    From rulesets & hardware to wordlists and mask attacks, Lead Penetration Tester Ryan Chaplin shows how to crack difficult password hashes in penetration tests.

    Read More Password Series: 8 Practical First Steps to Crack Difficult Passwords in Penetration TestsContinue

  • Password Series: Defeating Emerging Password Security Trends with Psudohash
    How To | Password Cracking | Penetration Testing

    Password Series: Defeating Emerging Password Security Trends with Psudohash for Penetration Testing

    ByRyan Chaplin November 5, 2024June 16, 2025

    Lead Pentester Ryan Chaplin discusses emerging improvements in password security and how Psudohash can help bypass them on penetration tests.

    Read More Password Series: Defeating Emerging Password Security Trends with Psudohash for Penetration TestingContinue

  • Password Length: More than Just a Question of Compliance
    Password Cracking | Security Recommendations | Tips For Everyone

    Password Length: More than Just a Question of Compliance

    ByBrian Tant June 4, 2024August 18, 2025

    Password length requirements are a key part of password security, but, with PCI, NIST, OWASP, and CIS offering different recommendations, what length is best?

    Read More Password Length: More than Just a Question of ComplianceContinue

2870 Peachtree Road
Suite #915-8924
Atlanta, GA 30305 USA

+1 678.421.4544

Contact us online for faster response

About Raxis

  • About Raxis
  • Careers
  • Terms and Conditions
  • Privacy Policy
  • Penetration Testing Partner Program

Resources

  • The Exploit Blog
  • Transporter Remote Penetration Testing
  • Penetration Test Glossary
  • What is a Penetration Test?
Facebook X Instagram Linkedin YouTube