Rethink Vulnerability Management

Faraday Blog

Create Resistance. Be one step ahead. A security platform to manage everything from one place.

Tips Nmap Script Engine

Nmap (Network Mapper) is a popular network scanner that allows discovering ports and services, providing relevant information about a network. In addition to basic port scanning, Nmap offers a wide range of options and advanced functionalities. It can perform TCP, UDP, and SCTP scans, operating system detection scans, service version detection, script scans, and much more. It also allows customization of scans and generation of detailed reports.

Read More

Our open-source tools go to Black Hat!

We're thrilled to announce that our groundbreaking tools, Faraday and EmploLeaks, have been selected to be part of this year's prestigious Black Hat Arsenal

Read More

Bypassing certificate pinning with our Head of Security Gabriel Franco

Many apps implement a security feature called Certificate Pinning, creating some problems when trying to intercept the traffic between the application and the server. Today, we’ll cover the basics about that and give some examples of how to bypass it using an Android mobile.

Read More

Faraday Red team goes to Chile with Ekoparty training

The primary objective of this training is to equip students with the ability to identify and analyze potential exposures that a company may face.
Their expertise in identifying exposures, understanding internal protocols, and implementing efficient security measures will make them invaluable assets in today's digital world, where companies must remain constantly vigilant to protect their operations, reputation, and data.

Read More

Faraday Vulnerability management platform: a seamless experience

Vuln management users seek to have a general, orderly and clear vision of the health in their security systems in order to assess and mitigate existing vulnerabilities.
They look for the platform that helps them identify and catalog vulnerabilities, separate what is urgent and important from what is secondary, classify them according to their severity and thus be able to assess the risk of their systems and networks.

Read More

Web Application pentesting: a guide

In Security, the concept of attack-surface (or attack surface) refers to the set of entry points that an attacker can use to access a system or application and carry out an attack. In other words, it is the complete map in which a system or application can be violated. They may include software vulnerabilities, insecure configurations, unauthorized access, open ports, application programming interfaces (APIs), among others. The larger the attack surface of a system or application, the greater the risk that an attacker could exploit a vulnerability and compromise the security of the system.

Read More