Author: admin

  • Boston Pentest & Cybersecurity

    Massachusetts, a vibrant hub of technology and innovation, has not remained untouched by the growing threat landscape of cybersecurity breaches – the proverbial Boston pentest. In recent years, the state has witnessed several high-profile incidents that emphasize the critical importance of robust security measures. This article will extensively delve into the top cybersecurity breaches that…

  • Massachusetts Cybersecurity & Networking

    Massachusetts, renowned for its technological prowess, and all it’s encompassing companies, have emerged as a powerhouse in the field of Massachusetts cybersecurity. In this digital age, where the integrity of networks and the protection of sensitive information are paramount, the state has become a breeding ground for innovative cybersecurity solutions. This article delves into the…

  • Evolution of Cybers: Network Pentesting

    This post will delve on 17 technologies that changed network pentesting in the past 24 years, since I was addicted to the internet basically. Here are the list of the 17 tech’s that have changed the landscape for both offensive and defensive cybersecurity practictioners. As a prelude of course, I first have to say that…

  • 17 att&ck Threats: Network Pentest Approach

    One effective framework for comprehending and addressing these threats is the MITRE ATT&CK matrix. In this discussion, we’ll explore 17 techniques from the matrix and delve into how a network pentest can be instrumental in preventing and mitigating such threats. Personally, I think the best examples of the att&ck framework can be found on hybrid-analysis.com.…

  • 17 Top Tech Companies in New England

    This is a short list of 17 top tech companies in New England. Several of these began as start-ups, and many of them were big-tech companies before the rise of tech as an industry in New England. Not all of them are located in Massachusetts, but a good amount are. If you’re looking to learn…

  • 17 Dorks & Network Pentesting Reconaissance

    Network penetration testing, an essential facet of cybersecurity, involves a meticulous process to identify and mitigate vulnerabilities within a network, and this is my post on network pentesting reconaissance with common Google dorks. Do note that this is only common Google dorks, the best ones, I actually use to help me secure my business growth!.…

  • 17 Breaches – Internal Network Pentest Could Have Prevented

    Date Company How Breached Company URL News Article 2013-12-19 Target Malware on Point-of-Sale systems Target Target Data Breach – CNBC 2014-09-02 Home Depot Malware in point-of-sale systems Home Depot Home Depot Confirms Breach – KrebsOnSecurity 2017-09-07 Equifax Exploited a vulnerability in website software Equifax Equifax Data Breach – The Guardian 2013-12-21 Adobe Cyber-attack, exposed user…

  • 17 Encryption Algorithms In Network Pentests

    This is a comprehensive list of the 17 top encryption algorithms found in network pentests. No. Encryption Algorithm URL Description 1 AES (Advanced Encryption Standard) NIST – AES AES is a symmetric encryption algorithm widely used for securing sensitive data. Its strength lies in its efficiency and security, making it a standard choice for various…

  • 17 Most Common OS’s – Network Pentesting

    Before you read the table below, I want to first say nixOS is one of my favorite OS’s used for network pentesting, followed by Kali. Neither are found on the table below, because this is a list of common OS’s found in organizations/in the wild. No. Operating System URL Description 1 Windows 10 Microsoft Windows…