mastodon.online is one of the many independent Mastodon servers you can use to participate in the fediverse.
A newer server operated by the Mastodon gGmbH non-profit

Server stats:

11K
active users

#PenetrationTesting

6 posts5 participants0 posts today

In this video, a student from Craw Security discusses how the Six Month Diploma in Information Security Course enabled him to launch a fulfilling career in the field of cyber security.

Want to become a cyber security expert? Enroll now -

Visit: craw.in/learn-information-secu
Call: +91-9513805401
.
.
#cybersecurity #ethicalhacking #penetrationtesting #malwareanalysis #pythonprogramming #ethicalhackingindelhi #studentreview #students #cybersecuritydiploma #CrawSec #CrawSecurity #LifeatCraw #Craw

🥲 Another client audit dropped? You're already juggling tight deadlines and budgets – the last thing you need is to waste time wrestling with report formatting instead of finding critical vulnerabilities.

How do you ensure your pentest reports are client-ready without extra work?

Discover how to write pentest reports that clients love (without the extra work) 👉 pentest-tools.com/blog/pentest

Pentest-Tools.comPro tips from 10 ethical hackers for stellar reportsDelve into the collective wisdom of 10 seasoned offensive security pros who've shared their insider tips on mastering the art of pentest reporting.

Could your organization be compromised in just one weekend? It can happen fast! In our latest blog, Penetration Testing Manager @tompohl walks you through a step-by-step cyberattack scenario showing how a zero-day vulnerability led to total system compromise.

Read our blog to learn how attackers weaponize public exploits, scan for exposed systems, and quickly gain admin access, as well as 10 expert strategies to protect your organization before the next zero-day hits. lmgsecurity.com/a-real-world-c

LMG SecurityA Real-World Cyber Attack Simulation: How a Hacker Can Breach Your Organization in One Weekend | LMG SecurityLearn how hackers can break into your organization in our step-by-step cyber attack simulation blog. We'll share the tactics today’s attackers use and provide 10 ways to boost your organization’s defenses.

❗️ hashtag#HardwareHacking in Action ❗

🔒 From SPI Sniffing to Keys: Extracting Clevis/BitLocker Secrets from TPM Traffic 🔒

Physical attacks on encryption systems may be more common than many think. Mateusz Lewczak shares findings from a real penetration test where he performed a hardware-based SPI Sniffing attack to extract encryption keys from a TPM.

💡 What is SPI Sniffing?

SPI (Serial Peripheral Interface) Sniffing relies on intercepting data exchanged between the TPM (Trusted Platform Module) and the processor during system startup. If an attacker can "see" this communication, sensitive data such as encryption keys used by Clevis or BitLocker can be exposed.

🔍 How did it work in this pentest?

Mateusz Lewczak used a logic analyzer and signal analysis tools to capture traffic from the SPI bus. By carefully probing the TPM module, the data
was analyzed, leading to the successful extraction of encryption keys. This allowed unauthorized access to encrypted disk data.

Key takeaways from the article:
✅ How SPI Sniffing works, step by step.
✅ Tools and hardware used for the test.
✅ Practical recommendations from a penetration testing perspective.

🔗 Read the full article and explore how hardware-based attacks can be carried out: securitum.com/extracting_clevi

www.securitum.comSecuritum - Security penetration testing.Securitum is a pure pentesting company specialising in the security of IT systems. We have experience in performing security audits (including penetration tests) - mainly for financial/e-commerce/industrial sectors. We have performed penetration tests and cyber security services for leading European banks (see references below). Due to our experience, penetration testing can be performed with broad insight, in many separate problem areas.

🎉 Securium Academy Holi Offer Still Live! 🎨✨
Online Diploma in Ethical Hacking & Penetration Testing – Now at 90% OFF! 🔥

💻 Learn from experts & kickstart your cybersecurity career today! 🚀
📢 Grab the Offer Before It Ends!

👇Click on the link below
🌐www.securiumacademy.com
📞8368543123

#CyberSecurity #Cybersecurity2025 #penetrationtesting #DataProtection #CEH #OSCP #CyberThreats #OnlineSecurity #CyberAware #InfoSec #CEHv13 #CyberSecurityCareer #CareerOpportunities #eccouncil

Our Warren Houghton is back at it again with Nerding Out with Viktor. Warren shares fascinating insights into how he successfully infiltrates secure spaces and bypasses sophisticated defences.
 
In this exciting follow-up conversation, they look into covert physical penetration testing covering OSINT, badge cloning, entry tactics, and the real impact of physical breaches on cybersecurity.
 
Watch the full episode here: vpetersson.com/podcast/S02E05.
 
Topics covered include technical tools and techniques used in physical penetration testing:

Badge cloning technologies and vulnerabilities in common access control systems
Lock picking tools and techniques, including the use of specialized tools for different scenarios
Under-the-door tools and methods for bypassing door sensors
The effectiveness of tailgating as an entry method
The vulnerabilities of magnetic locks and how they can be compromised

Warren shares fascinating experiences from his career, including breaking into:

A bank in Amsterdam where he successfully accessed the stock trading floor
An arena with inadequate security measures
Corporate buildings with sophisticated access control systems

🔐 P1 Security is now a CSA-Licensed Penetration Testing Provider!

We are proud to announce that P1 Security has been officially licensed by the Cyber Security Agency of Singapore (CSA) to provide Penetration Testing services.

This milestone reinforces our commitment to securing critical telecom infrastructure and ensuring that mobile operators and nation-states stay ahead of evolving cyber #threats.

With this #licence, we continue delivering advanced security assessments that help our partners strengthen their defenses, reduce attack surfaces, and protect vital communications networks.

📡 Telecom security isn’t optional, it’s #critical.