If you really, honestly, and truly want to take your reports to the next level, hire an editor.
If what you did does not show up in your pentest report, it didn’t happen. So how do you make sure your report captures everything you did? (First in a series of posts.)
The old adage, “knowledge is power,” is true in general, but in infosec, knowledge is mission critical. Luckily, there are a lot of tools to make recon easier.
John Strand and a whole bunch of his friends just spent 24 hours straight, talking, joking, telling stories, sharing life experiences, making music, and generally fooling around, all while live and streaming their shenanigans over YouTube.
The Internet is a tool that has dramatically altered how we interact with each other, and not all those changes are for the better.
Highly automated GUI-interface tools are only as good as the programmers who wrote them. Additionally, they can actually prevent users from accessing certain things.
“Hardening” is a term used by IT professionals to describe various processes used to make computer systems more secure against different kinds of attacks.