Pen Test

February 5, 2020
3 Vulnerabilities to be on the Lookout for in 2020

3 Vulnerabilities to be on the Lookout for in 2020 1.Security Misconfigurations What is a security misconfiguration? A security misconfiguration...

Read More
March 13, 2019
XXE Vulnerability in BlackBerry AtHoc (Networked Crisis Communication) Platform

Recently I had the opportunity to test an installation of AtHoc – BlackBerry’s emergency notification system. During the course of...

Read More
January 2, 2019
2018 YEAR IN REVIEW: Open Source Collaboration

Supporting Open Source At MindPoint Group we recognize the value that open source software provides and we work to support...

Read More
November 18, 2018
REST Assured: Penetration Testing REST APIs Using Burp Suite: Part 2 – Testing

Welcome back! In part 1 of REST Assured blog series, we discussed the definitions and history behind APIs, and we...

Read More
November 14, 2018
REST Assured: Penetration Testing REST APIs Using Burp Suite: Part 1 – Introduction & Configuration

Pen Testing REST API with Burp Suite Introduction:   Hello and welcome to our 3-part blog series where we will...

Read More
May 9, 2018
Conducting and Detecting Data Exfiltration

How to Conduct and Detect Data Exfiltration Is your organization taking proactive measures to prevent a data breach?  From 2016...

Read More
March 3, 2017
Lateral Movement with PSExec

Lateral Movement: An Overview During the early stages of an engagement, penetration testers look to gain a foothold into the...

Read More
November 24, 2016
Stop By Booth 118 @ AWS re:Invent and Speak to Our Team of Cybersecurity Experts

Read More
November 24, 2016
Stop by Booth 118 @ AWS re:Invent to Learn How We Can Secure Your Cloud

Read More
October 15, 2015
Privilege Escalation via Group Policy Preferences (GPP)

While this is not a new topic in the penetration testing world by any means [Chris Gates (@carnal0wnage) and others...

Read More
June 2, 2014
Tool Review: Firebind Reflector Overview

Recently, Gus and I took a look at a tool that could be an asset in a Vulnerability Assessment and...

Read More
June 2, 2014
Tool Review: Firebind Reflector Walk-Through

I’m providing a walk-through of Firebind to go along with the overview that Joe has provided here. In this scenario,...

Read More
12