Search Results for: penetration test Blog Post Department of Interior Penetration Test October 2, 2020 IT systems of the governmental institutions are vital elements required to maintain smooth operations of a state or a country.... Knowledge Center Successful (And Easy) Attack Vectors 2020 May 3, 2021 How can attackers access your MFA-protected Company mailboxes? How can they move from one machine to another in your infrastructure?... Blog Post Introduction To Black Teaming Exercises January 15, 2021 From startups to enterprises, organizations of all sizes require a structured approach to secure their IT infrastructure. An adequate level... Blog Post OffSec Releases Win-KeX 2.0 with Exciting New Features October 7, 2020 Win-KeX is a Kali Desktop Experience for Windows Subsystem for Linux (WSL 2). It allows users to run Kali Linux... Blog Post What is black box Pentesting? October 28, 2020 Organizations implement a broad range of security measures to maintain a sound security posture. These security measures can be either... Blog Post Red Teaming Exercise With Ethical Hackers Of LIFARS December 21, 2020 Can your organization withstand a targeted attack? You can find out easily through Red Teaming – a simulation of a... Blog Post How To Approach A Purple Teaming Exercise? December 3, 2020 As cyberattacks continue to grow in numbers and impact, businesses cannot adopt a static security program with minor updates. Continuous... Knowledge Center Virus Checker March 3, 2020 Virus Checker – External network & internal network penetration test device configuration review. What is it? Antivirus aggregation engine Scan... Blog Post What Is Cyber Kill Chain Process? October 23, 2020 Cyber Kill Chain is a concept branded by Lockheed Martin, that describes how the attacker proceeds with his steps during... Knowledge Center Outlook Web Application (OWA) and Office 365 (O365) Hacking January 17, 2020 LIFARS regularly conducts penetration tests to ensure the effectiveness of the security measures of our clients maintain strong and can... Knowledge Center Cisco and Fortinet Hacking – Case Study February 9, 2020 To ensure the effectiveness of our client’s security implementations LIFARS frequently conducts penetration tests evaluating their systems can hold up... Blog Post Missing SPARTA in latest Kali Linux 2020.1? Try LEGION! April 28, 2020 Popular open-source tool Sparta is no longer available in Kali Linux because of unsupported Python version. Tools depending on Python... Blog Post What Is Open-Source Intelligence and Why Is It Important? January 18, 2021 The initial stage of a penetration test requires the testers to gather information about the target organization and its IT... Blog Post Zenmap installation guide – Kali Linux 2019.4 January 14, 2020 Zenmap is a cross-platform GUI (Graphical User Interface) for Nmap. This open-source tool is designed to make Nmap easy for... Blog Post Thousands of U.S. Birth Certificates and Death Certificate Applications Revealed! December 13, 2019 An online company used a cloud services platform to store more than 752,000 U.S. birth certificate applications, and the...
Blog Post Department of Interior Penetration Test October 2, 2020 IT systems of the governmental institutions are vital elements required to maintain smooth operations of a state or a country....
Knowledge Center Successful (And Easy) Attack Vectors 2020 May 3, 2021 How can attackers access your MFA-protected Company mailboxes? How can they move from one machine to another in your infrastructure?...
Blog Post Introduction To Black Teaming Exercises January 15, 2021 From startups to enterprises, organizations of all sizes require a structured approach to secure their IT infrastructure. An adequate level...
Blog Post OffSec Releases Win-KeX 2.0 with Exciting New Features October 7, 2020 Win-KeX is a Kali Desktop Experience for Windows Subsystem for Linux (WSL 2). It allows users to run Kali Linux...
Blog Post What is black box Pentesting? October 28, 2020 Organizations implement a broad range of security measures to maintain a sound security posture. These security measures can be either...
Blog Post Red Teaming Exercise With Ethical Hackers Of LIFARS December 21, 2020 Can your organization withstand a targeted attack? You can find out easily through Red Teaming – a simulation of a...
Blog Post How To Approach A Purple Teaming Exercise? December 3, 2020 As cyberattacks continue to grow in numbers and impact, businesses cannot adopt a static security program with minor updates. Continuous...
Knowledge Center Virus Checker March 3, 2020 Virus Checker – External network & internal network penetration test device configuration review. What is it? Antivirus aggregation engine Scan...
Blog Post What Is Cyber Kill Chain Process? October 23, 2020 Cyber Kill Chain is a concept branded by Lockheed Martin, that describes how the attacker proceeds with his steps during...
Knowledge Center Outlook Web Application (OWA) and Office 365 (O365) Hacking January 17, 2020 LIFARS regularly conducts penetration tests to ensure the effectiveness of the security measures of our clients maintain strong and can...
Knowledge Center Cisco and Fortinet Hacking – Case Study February 9, 2020 To ensure the effectiveness of our client’s security implementations LIFARS frequently conducts penetration tests evaluating their systems can hold up...
Blog Post Missing SPARTA in latest Kali Linux 2020.1? Try LEGION! April 28, 2020 Popular open-source tool Sparta is no longer available in Kali Linux because of unsupported Python version. Tools depending on Python...
Blog Post What Is Open-Source Intelligence and Why Is It Important? January 18, 2021 The initial stage of a penetration test requires the testers to gather information about the target organization and its IT...
Blog Post Zenmap installation guide – Kali Linux 2019.4 January 14, 2020 Zenmap is a cross-platform GUI (Graphical User Interface) for Nmap. This open-source tool is designed to make Nmap easy for...
Blog Post Thousands of U.S. Birth Certificates and Death Certificate Applications Revealed! December 13, 2019 An online company used a cloud services platform to store more than 752,000 U.S. birth certificate applications, and the...