While exploring some new OSINT data sources and techniques, we realized we had an easy way to identify an enormous number of domains that were vulnerable to takeover attacks.
Beef up the realism in your lab environment with simulated users. Invoke-UserSimulator mimicks active users in a corporate environment browsing the internet, mapping file shares, and opening email.
We recently worked with the Drexel's cyber security club in preparation for this years CCDC. They were able to test their strategy and practice in our lab, and we got some awesome feedback.
We’re proud to announce our brand new penetration testing lab offerings. Here’s what we’re all about.