Mobile phones have become an indispensable part of our daily life. We use mobile phones to communicate with our loved ones, for quick access to
KPMG Europe’s internal information security conference – Hacknet, was held in Berlin and lasted two days, the 29th and the 30th of April. This year,
The exploitation of a machine is only one step in a penetration test. What do you do next? How can you pivot from the exploited
In this post we will take a quick look at the differences between vulnerability assessment (VA) and penetration testing (PT). Furthermore, we’ll give a set of
During a recent internal penetration test, we got to the point where we had to search a lot of Windows machines for Domain Admin tokens.