Skip to main content

Securing Connection

Initializing security protocols...

Back to Articles
Penetration Testing

Articles tagged: Penetration Testing

Explore 9 articles related to Penetration Testing

Wi-Fi protocols
WIFI Penetration TestingWIFI

The Difference Between WEP, WPA, and WPA2 Wi-Fi protocols

Pretty much everywhere you go today, there is a WiFi network you can connect to. Whether it be at home, at the office or at the local coffee shop. Every WiFi network is setup with some kind of network security, either open for all to access or extremely restricted where only certain clients can connect. Even if you know you need to secure your Wi-Fi network (and have already done so), you probably find all the security protocols little bit confusing.

September 15, 2019
Like a Special Forces Unit - Red Team Operations Require Planning, Recon and Equipment
Red TeamReconnaissance

Like a Special Forces Unit - Red Team Operations Require Planning, Recon and Equipment

The second phase of a red team assessment is reconnaissance. In this phase, the red team attempts to collect information relevant to the assessment while keeping as low of a profile as possible. In order to successfully perform effective, largely passive reconnaissance, the red team members need to access a variety of data sources and have a means for organizing the collected information to maximize its usability for the assessment.

August 25, 2019

Explore Other Topics

Penetration Testing Articles | Scorpiones.io