Our sprawling pen-testing series has taken on a life of its own! For your convenience and blog reading pleasure, we’ve assembled all the links to this six seven part series below.
Read consecutively, or since they’re mostly self-contained posts, skip ahead to the topics that appeal to you.
Part 1: Risky Business
Part 2: Rats!
Part 3: Rats & Reverse Shells
Part 4: Making a Lateral Move
Part 5: Hash Dumping & Cracking
Part 6: Passing the Hash
Part 7: Exfiltration and Conclusions
By the way, if you just want a list of good pen testing tools for newbies, check out this post.
What should I do now?
Below are three ways you can continue your journey to reduce data risk at your company:
Schedule a demo with us to see Varonis in action. We'll personalize the session to your org's data security needs and answer any questions.
See a sample of our Data Risk Assessment and learn the risks that could be lingering in your environment. Varonis' DRA is completely free and offers a clear path to automated remediation.
Follow us on LinkedIn, YouTube, and X (Twitter) for bite-sized insights on all things data security, including DSPM, threat detection, AI security, and more.