Blog

Selecting a Penetration Testing Provider – PART 2

Posted by Jake Reynolds on October 12, 2021Link 

In last week’s blog, I started outlining some of the considerations when choosing a penetration testing provider, including a list of general questions you should ask during your early correspondence with a prospective provider. As mentioned in my previous post, procuring offensive security services is a relatively new undertaking for many companies, and the complexities can make...Continue reading 

Selecting a Penetration Testing Provider – PART 1

Posted by Jake Reynolds on October 05, 2021Link 

Recently, I received a call from a long-time friend of mine with who I had never had the opportunity to work professionally. His company was launching a new online store, and after hearing his plans, we conducted an application penetration test to ensure it was secure for launch. This was the last person I thought I would have career intersectionality...Continue reading 

Bypassing App Locker & CLM While Evading EDR

Posted by Brendan Ortiz on September 29, 2021Link 

Applocker Image

Introduction The  last blog post I wrote got way more recognition than I expected and because of that, I was inspired to continue writing and sharing my experiences/research. This blog will be about the short journey I took to hone bypasses relating to Constrained Language Mode in PowerShell and AppLocker Policies. My goal was to create payloads that...Continue reading 

Have Questions?
Get Answers