Search Results for: penetration Blog Post Department of Interior Penetration Test October 2, 2020 IT systems of the governmental institutions are vital elements required to maintain smooth operations of a state or a country.... Blog Post Top Penetration Testing Certifications May 30, 2020 To be a penetration tester, you should always start with other IT and tech careers, such as general IT, but... Blog Post What is Penetration Testing? January 29, 2020 Penetration testing is a type of security testing that evaluates an organization’s ability to protect its application, network, system, and... Blog Post Vulnerability Scanning, Penetration Testing, Red Teaming – Know the Difference July 28, 2020 Vulnerability scanning, penetration testing, and red teaming all belong to the branch of proactive security. Experts performing these offensive security... Blog Post What is Penetration Testing? February 6, 2019 Penetration testing is an interesting subsection of cyber security. Where many areas of cyber security focus on defending networks, penetration... Knowledge Center Penetration Testing Identify Weak Points Before Getting Hacked July 30, 2019 Penetration Testing can no longer be considered an automated check box exercise as the breaches in the headlines demonstrate that... Blog Post What is black box Pentesting? October 28, 2020 Organizations implement a broad range of security measures to maintain a sound security posture. These security measures can be either... Blog Post OffSec Releases Win-KeX 2.0 with Exciting New Features October 7, 2020 Win-KeX is a Kali Desktop Experience for Windows Subsystem for Linux (WSL 2). It allows users to run Kali Linux... Knowledge Center Outlook Web Application (OWA) and Office 365 (O365) Hacking January 17, 2020 LIFARS regularly conducts penetration tests to ensure the effectiveness of the security measures of our clients maintain strong and can... Blog Post Zenmap installation guide – Kali Linux 2019.4 January 14, 2020 Zenmap is a cross-platform GUI (Graphical User Interface) for Nmap. This open-source tool is designed to make Nmap easy for... Knowledge Center Cisco and Fortinet Hacking – Case Study February 9, 2020 To ensure the effectiveness of our client’s security implementations LIFARS frequently conducts penetration tests evaluating their systems can hold up... Blog Post Missing SPARTA in latest Kali Linux 2020.1? Try LEGION! April 28, 2020 Popular open-source tool Sparta is no longer available in Kali Linux because of unsupported Python version. Tools depending on Python... Blog Post Introduction To Black Teaming Exercises January 15, 2021 From startups to enterprises, organizations of all sizes require a structured approach to secure their IT infrastructure. An adequate level... Knowledge Center Virus Checker March 3, 2020 Virus Checker – External network & internal network penetration test device configuration review. What is it? Antivirus aggregation engine Scan... Knowledge Center Penetration Testing Whitepaper August 1, 2017 Penetration testing. Penetration testing, also known as pen testing, is an authorized attempt into an IT system to evaluate its security...
Blog Post Department of Interior Penetration Test October 2, 2020 IT systems of the governmental institutions are vital elements required to maintain smooth operations of a state or a country....
Blog Post Top Penetration Testing Certifications May 30, 2020 To be a penetration tester, you should always start with other IT and tech careers, such as general IT, but...
Blog Post What is Penetration Testing? January 29, 2020 Penetration testing is a type of security testing that evaluates an organization’s ability to protect its application, network, system, and...
Blog Post Vulnerability Scanning, Penetration Testing, Red Teaming – Know the Difference July 28, 2020 Vulnerability scanning, penetration testing, and red teaming all belong to the branch of proactive security. Experts performing these offensive security...
Blog Post What is Penetration Testing? February 6, 2019 Penetration testing is an interesting subsection of cyber security. Where many areas of cyber security focus on defending networks, penetration...
Knowledge Center Penetration Testing Identify Weak Points Before Getting Hacked July 30, 2019 Penetration Testing can no longer be considered an automated check box exercise as the breaches in the headlines demonstrate that...
Blog Post What is black box Pentesting? October 28, 2020 Organizations implement a broad range of security measures to maintain a sound security posture. These security measures can be either...
Blog Post OffSec Releases Win-KeX 2.0 with Exciting New Features October 7, 2020 Win-KeX is a Kali Desktop Experience for Windows Subsystem for Linux (WSL 2). It allows users to run Kali Linux...
Knowledge Center Outlook Web Application (OWA) and Office 365 (O365) Hacking January 17, 2020 LIFARS regularly conducts penetration tests to ensure the effectiveness of the security measures of our clients maintain strong and can...
Blog Post Zenmap installation guide – Kali Linux 2019.4 January 14, 2020 Zenmap is a cross-platform GUI (Graphical User Interface) for Nmap. This open-source tool is designed to make Nmap easy for...
Knowledge Center Cisco and Fortinet Hacking – Case Study February 9, 2020 To ensure the effectiveness of our client’s security implementations LIFARS frequently conducts penetration tests evaluating their systems can hold up...
Blog Post Missing SPARTA in latest Kali Linux 2020.1? Try LEGION! April 28, 2020 Popular open-source tool Sparta is no longer available in Kali Linux because of unsupported Python version. Tools depending on Python...
Blog Post Introduction To Black Teaming Exercises January 15, 2021 From startups to enterprises, organizations of all sizes require a structured approach to secure their IT infrastructure. An adequate level...
Knowledge Center Virus Checker March 3, 2020 Virus Checker – External network & internal network penetration test device configuration review. What is it? Antivirus aggregation engine Scan...
Knowledge Center Penetration Testing Whitepaper August 1, 2017 Penetration testing. Penetration testing, also known as pen testing, is an authorized attempt into an IT system to evaluate its security...