Blog

Depth Security Blog

Blog

Penetration Testing
Industries
Case Studies
Company
Resources
Contact Us

Penetration Testing

https://depthsecurity.com/

Tools

H3

H4

H5
H6
Meme about weak password policies and the filtering problem

Why Most Password Policies are Weak: The Filtering Problem

Compromised credentials can quickly snowball into complex kill chains that can cripple entire networks and...
Read More
Figure 5: Starting the Evil-Twin Network

Revenge of the Zombie Networks

It is well known now that setting up a secure wireless network can be tricky...
Read More
RelayKing banner

Introducing RelayKing – Relay To Royalty

If you’re anything like me and/or an offensive security professional, you’re probably very, very familiar...
Read More
Successful SMB->SMB Relay With CVE-2025-33073

Using NTLM Reflection to Own Active Directory (CVE-2025-33073)

Like many other pentesters and offensive security professionals out there, we’ve been getting a ton...
Read More
Meme of man on phone saying Yeah, Listen Uh, we messed up

Conditional Access Policies for Dummies

  Your Entra ID tenant looks bulletproof. Users are required to authenticate with MFA. You’ve...
Read More
Scooby Doo character Fred Jones unmasking a villain

When Multi-Factor Authentication Is Actually Single-Factor: The Enrollment Security Gap

  Introduction Multi-Factor Authentication (MFA) is an effective way to protect accounts from unauthorized access...
Read More
Screen shot of connectivity and security settings for wireless infrastructure

Securing Wireless Infrastructure – Part 1

  Intro The wireless security landscape has remained largely unchanged since the development of Wi-Fi...
Read More
Depth Security logo

Indicators Of Poor Assessment Work

In the 11+ years Depth has been in business we’ve had the opportunity to see...
Read More
Screenshot of Spray 365 in action the Office 365 password spraying solution

Spray 365: A New Twist On Office 365 Password Spraying

TL;DR The current state of password spraying Office 365 accounts could benefit from new approaches...
Read More

Contact Us Today

Schedule a free consultation to meet with a pen testing expert and receive a security assessment that identifies the services you need, so that your operations stay secure.