We stopped trying to convince customers and got triple the results

One small thing changed my B2B marketing work in a big way. About five years ago, someone sent me a video on a Tulsa, Oklahoma business that changed the entire way I approach sales and marketing. The first thing that caught my attention was that Mother Teresa had publicly endorsed the business. “Wait,” I thought. […]

Persistence – Screensaver

Screensavers are part of Windows functionality and enable users to put a screen message or a graphic animation after a period of inactivity. This feature of Windows it is known to be abused by threat actors as a method of persistence. This is because screensavers are executable files that have the .scr file extension and […]

Persistence – Shortcut Modification

Windows shortcuts contain a reference to a software installed on the system or to a file location (network or local). Since the early days of malware shortcuts have been used as a method of executing malicious code for persistence. The file extension of a shortcut is .LNK and gives a number of opportunities to red […]

Most Important Web Server Penetration Testing Checklist

Web server pen testing performing under 3 major category which is identity, Analyse, Report Vulnerabilities such as authentication weakness, configuration errors, protocol Relation vulnerabilities.  1.  “Conduct a serial of methodical and Repeatable tests “ is the best way to test the web server along with this to work through all of the different application Vulnerabilities. […]