blog

Our Latest Blogs

Explore our latest blog posts and stay secure in a digital world.

Leveraging Log4j Exploit to Domain Administrator
January 11, 2022
Blacklock

We recently performed another internal network assessment with the goal to gain Domain Administrator access on the target network. We had unauthenticated access to the network, i.e. unauthorized user or an internal attacker onto the user LAN.

Tools, Techniques & Processes: From Zero to Domain Administrator
November 24, 2021
Blacklock

We recently performed an internal network penetration test for a large enterprise with up to 3 domains and 2000+ hosts. We had zero knowledge of the target network (as an attacker would have) and were placed onto the user VLAN with unauthenticated access.

Keeping up with the best at the CHCon Hacker Conference
November 11, 2021
Blacklock

Purple Teams, cables and continuous assurance; CHCon took place on November 5-6 in Christchurch in the historic Main Hall at the Arts Centre heritage site. Blacklock was proud to be a Bronze sponsor.

Agile Penetration Testing: What, Why & How?
October 29, 2021
Blacklock

Agile methodologies in software development have accelerated in recent years, helping businesses provide value to customers much faster. This approach takes an interactive approach to software development, where products are developed in small iterations throughout the entire process.

PTaaS and Its End-User Benefits
September 20, 2021
Blacklock

Digitalisation has made many businesses adopt new technologies at an ever-increasing rate. The change to agile approaches has been central to all this, as they enable businesses to solve solutions much faster. But one area that hasn't kept up is penetration (security) testing, as it remains costly, inefficient, and complex. With a correlated rise of malicious cyberattacks, many businesses are at risk of financial and data losses that can leave severe and lasting impacts.

PTaaS vs Crowdsourcing
August 25, 2021
Blacklock

With the ability to draw fresh ideas from large crowds, save costs and generate brand awareness, it’s easy to see the attractiveness of crowdsourcing. But it can always leave you wide open to more failure and generate unprecedented turbulence, especially around intellectual property, cross-border data sharing and work quality. With the increased likelihood of such threats, crowdsourcing can be a questionable choice.

What is PTaaS and How Does It Work?
July 30, 2021
Blacklock

The correlation between the rise of online businesses and cyber-attacks is no coincidence. With nearly 1 cyber-attack happening every 39 seconds, every business is at risk. Unfortunately, many of them are underprepared because traditional penetration testing is costly, lengthy and complicated.

Android Pentesting with Genymotion and Burp
February 15, 2021
Blacklock

A quick blog post and reference guide to setup and getting started with Android application penetration testing.

Utilizing Metasploit Database in Network Pentest
February 12, 2019
Blacklock

What’s the first thing come to your mind when you think of doing network pentest of over 1000 IPs in couple of weeks? Is it really possible? Answer is YES!!!

Subscribe to our newsletter

Join our newsletter today and enhance your knowledge with valuable insights. It's quick, easy, and free!

Be a Team Player
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.