Blog

Depth Security Blog

Blog

Penetration Testing
Industries
Case Studies
Company
Resources
Contact Us

Penetration Testing

https://depthsecurity.com/

Tools

H3

H4

H5
H6

Securing Wireless Infrastructure – Part 1

  Intro The wireless security landscape has remained largely unchanged since the development of Wi-Fi...
Read More

Indicators Of Poor Assessment Work

In the 11+ years Depth has been in business we’ve had the opportunity to see...
Read More

Spray 365: A New Twist On Office 365 Password Spraying

TL;DR The current state of password spraying Office 365 accounts could benefit from new approaches...
Read More
Defeating Av

Classic API Unhooking To Bypass EDR Solutions

Intro This blog post will be covering the classic technique used to unhook Windows APIs...
Read More
Dllinjeciton

Reflective DLL Injection In C++

TL;DR Implant with our encrypted DLL -> allocates memory for the DLL -> put the...
Read More

Selecting A Penetration Testing Provider – PART 2

In last week’s blog, I started outlining some of the considerations when choosing a penetration testing...
Read More

Selecting A Penetration Testing Provider – PART 1

Recently, I received a call from a long-time friend of mine with who I had...
Read More
Applocker Image

Bypassing App Locker & CLM While Evading EDR

Introduction The  last blog post I wrote got way more recognition than I expected and...
Read More

Obfuscating Malicious, Macro-Enabled Word Docs

Overview I was working on my OSEP certification when I was inspired to stop studying...
Read More

Contact Us Today

Schedule a free consultation to meet with a pen testing expert and receive a security assessment that identifies the services you need, so that your operations stay secure.