Good practices in Cybersecurity – Part 3
Offensive SecurityRed teamCybersec
May 29, 2024
Good security practices go hand in hand with automation, integration, and collaboration. As dynamic as the threat landscape is, so must our strategy be. With over 26 thousand vulnerabilities reported last year, it’s now more important than ever to shift security from left to right, and then everywhere.
Good practices in Cybersecurity – Part 2
Offensive SecurityRed teamCybersec
March 12, 2024
Nowadays, we can distinguish various branches within a security team Red Teams, Blue Teams, Purple Teams & Bug Hunters.
But what does each team do?
This difference in colors, adding a new category related to bug bounty, makes us think about common tasks that all these approaches can have within a company; and the truth is, they have a lot. First, let's talk about the definition of each one.
Tips Nmap Script Engine
Offensive SecurityRed teamPentestingVulnerability Management
June 28, 2023
Nmap (Network Mapper) is a popular network scanner that allows discovering ports and services, providing relevant information about a network. In addition to basic port scanning, Nmap offers a wide range of options and advanced functionalities. It can perform TCP, UDP, and SCTP scans, operating system detection scans, service version detection, script scans, and much more. It also allows customization of scans and generation of detailed reports.
Release v4.3.5
Offensive SecurityVulnerability ManagementLatest Release
May 4, 2023
We are happy to share the latest updates of our vulnerability management platform.
Faraday v4.3.5 is here!
It has been planned with our customers in mind. We are redefining productivity and making our platform more powerful and user-friendly than ever to enhance your experience securing your systems.
Web Application pentesting: a guide
Offensive SecurityRed teamPentestingVulnerability Management
April 20, 2023
In Security, the concept of attack-surface (or attack surface) refers to the set of entry points that an attacker can use to access a system or application and carry out an attack. In other words, it is the complete map in which a system or application can be violated. They may include software vulnerabilities, insecure configurations, unauthorized access, open ports, application programming interfaces (APIs), among others. The larger the attack surface of a system or application, the greater the risk that an attacker could exploit a vulnerability and compromise the security of the system.
Nuclei: Attack Surface with Faraday
Offensive SecurityRed teamPentestingVulnerability Management
April 6, 2023
In Security, the concept of attack-surface (or attack surface) refers to the set of entry points that an attacker can use to access a system or application and carry out an attack. In other words, it is the complete map in which a system or application can be violated. They may include software vulnerabilities, insecure configurations, unauthorized access, open ports, application programming interfaces (APIs), among others. The larger the attack surface of a system or application, the greater the risk that an attacker could exploit a vulnerability and compromise the security of the system.