Internal Persistence Techniques

Internal Persistence Techniques

The majority of our internal penetration tests are at least a week long. While we generally have a drop box sent to the client to enable our access to the network, we have to consider efficiency as well. Ensuring persistent access in a network is vital to that...
Pentest Tales #002: Digging Deep​

Pentest Tales #002: Digging Deep​

Welcome to the second edition of Pentest Tales, a blog series that walks through real-world pentests we’ve performed in the past. The purpose of this blog is not just to share the “owning” of a domain, but to provide education as to why a domain was...