3 min
Phishing
Lessons from a Pen Test: The Power of a Well-Researched and Well-Timed Phishing Email
On a recent pen test, Steve Laura saw just how effective phishing emails can be with the right research and timing.
4 min
Research
This One Time on a Pen Test, Part 5: From Physical Security Weakness to Strength
During a physical social engineering penetration test, I easily got into the office with the help of a copied badge and polite employees. But would the company learn its lesson?
4 min
Penetration Testing
Pentesting in the Real World: Local File Inclusion with Windows Server Files
This is the 5th in a series of blog topics by penetration testers, for
penetration testers, highlighting some of the advanced pentesting techniques
they'll be teaching in our new Network Assault and Application Assault
certifications, opening for registration this week. For more information, check
out the training page at
www.rapid7.com/services/training-certification/penetration-testing-training.jsp
[http://www.rapid7.com/services/training-certification/penetration-testing-training.jsp]
First