Red Team vs Blue Team: What’s the Difference?

Red team cyber security assessments are a crucial way of giving organisations a practical understanding of their defence capabilities. In these exercises, the red team faces off against their counterparts, the blue team, in a battle to control a particular asset. That could be sensitive data, financial records, communication channels or the organisation’s infrastructure itself. Assessments can be adapted to suit particular requirements. However, the objective is always to learn how a cyber criminal might target your organisation in real life, and the steps that your security personnel would take to prevent attacks. But who exactly are the red and

The post Red Team vs Blue Team: What’s the Difference? appeared first on IT Governance UK Blog.

July 13, 2023
Read More >>

Hack The Box: Inject Machine Walkthrough – Easy Difficulty

In this post, I would like to share a walkthrough of the Inject Machine from Hack the Box This room will be considered an Easy machine on Hack the Box What will you gain from the Inject machine? For the user flag, you will need to execute the PATH Traversal which leaks the framework application where […]

The post Hack The Box: Inject Machine Walkthrough – Easy Difficulty appeared first on Threatninja.net.

July 9, 2023
Read More >>

7 Types of Penetration Testing: Guide to Pentest Methods & Types

Penetration tests are vital components of vulnerability management programs. In these tests, white hat hackers try to find and exploit vulnerabilities in your systems to help you stay one step ahead of cyberattackers. Because these tests can use illegal hacker techniques, pentest services will sign a contract detailing their roles, goals, and responsibilities. To make […]

The post 7 Types of Penetration Testing: Guide to Pentest Methods & Types appeared first on eSecurityPlanet.

June 28, 2023
Read More >>

Hack The Box: Stocker Machine Walkthrough – Easy Difficulty

In this post, I would like to share a walkthrough of the Stocker Machine from Hack the Box This room will be considered an Easy machine on Hack the Box What will you gain from the Stocker machine? For the user flag, you will need to abuse the JSON exploitation to bypass the login which leads […]

The post Hack The Box: Stocker Machine Walkthrough – Easy Difficulty appeared first on Threatninja.net.

June 24, 2023
Read More >>