资讯

Artificial intelligence (AI) and machine learning (ML) features are being implemented on devices. They could allow the ...
When we planned PTP Cyber Fest, we set out to create something different from the usual cybersecurity events.  After two busy ...
Enhance your organisation's password security with Pen Test Partners' PAPA service. Identify weak credentials by securely ...
Assess your organisation's physical security with Pen Test Partners' covert and overt testing services. Our experts simulate real-world intrusion attempts to identify vulnerabilities, test staff ...
Practice being punched in the face. The realities of incident response preparation “Everyone has a plan until they get punched in the face.” This Mike Tyson boxing quote perfectly encapsulates the ...
All at sea. Thought your OT / IT infrastructure was complex? Try doing it on a cruise ship. Cruise ships are possibly the most complex collection of systems that you’ll find in one physical, moving ...
Unit 2, Verney Junction Business Park, ...
Integrate security into every phase of your software development lifecycle with Pen Test Partners' Secure SDLC services. Our experts help you embed robust security controls from design to deployment, ...
As Red Teamers, we often find information in SharePoint that can be useful for us in later attacks. As part of this we regularly want to download copies of the file, or parts of their contents. In ...
SharePoint is a Microsoft platform that enables collaborative working and information sharing. This done with team sites. They work like regular intranet pages with graphics and text, but they also ...
In an engagement we found an open directory on the internet belonging to our client By enumerating it we found a zip archive with a configuration file holding usernames and passwords That file gave us ...
The ability to edit Group Policy Object (GPOs) from non-domain joined computers using the native Group Policy editor has been on my list for a long time. This blog post takes a deep dive into what ...