Software

83% of businesses have no established security plan (but they’ve got Kool-Aid)

By |2020-03-31T10:27:51-04:00October 18th, 2012|

I (Adriel) read an article published by Charles Cooper of c|net regarding small businesses and their apparent near total lack of awareness with regards to security.  The article claims that 77% of small- and medium-sized businesses think that they are secure yet 83% of those businesses have [...]

Comments Off on 83% of businesses have no established security plan (but they’ve got Kool-Aid)

Selling zero-day’s doesn’t increase your risk, here’s why.

By |2020-03-31T10:28:00-04:00August 13th, 2012|

The zero-day exploit market is secretive. People as a whole tend to fear what they don’t understand and substitute fact with speculation.  While very few facts about the zero-day exploit market are publicly available, there are many facts about zero-days that are available.  When those facts [...]

Comments Off on Selling zero-day’s doesn’t increase your risk, here’s why.

Hacking the Sonexis ConferenceManager

By |2020-04-02T13:44:17-04:00February 13th, 2012|

Netragard's Penetration Testing services use a research based methodology called Real Time Dynamic Testing™. Research based methodologies are different in that they focus on identifying both new and known vulnerabilities whereas standard methodologies usually, if not always identify known vulnerabilities. Sometimes when performing research based penetration testing we [...]

Comments Off on Hacking the Sonexis ConferenceManager

Netragard’s Badge of Honor (Thank you McAfee)

By |2020-03-31T10:29:21-04:00November 15th, 2011|

Here at Netragard We Protect You From People Like Us™ and we mean it.  We don’t just run automated scans, massage the output, and draft you a report that makes you feel good.  That's what many companies do.  Instead, we "hack" you with a methodology that [...]

Comments Off on Netragard’s Badge of Honor (Thank you McAfee)

Netragard Challenges your PCI Compliance

By |2020-03-31T10:30:12-04:00January 25th, 2011|

The purpose of legitimate Network Penetration Testing is to positively identify risks in a targeted IT Infrastructure before those risks are identified and exploited by malicious hackers. This enables the IT managers to remediate against those risks before they become an issue. To accomplish this the [...]

Comments Off on Netragard Challenges your PCI Compliance

Netragard: Connect to chaos

By |2020-03-31T10:30:20-04:00January 16th, 2011|

The Chevy Volt will be the first car of its type: not because it is a hybrid electric/petrol vehicle, but because GM plans to give each one the company sells its own IP address. The Volt will have no less than 100 microcontrollers running its systems from [...]

Comments Off on Netragard: Connect to chaos

Netragard’s thoughts on Pentesting IPv6 vs IPv4

By |2020-03-31T10:30:26-04:00January 14th, 2011|

We’ve heard a bit of “noise” about how IPv6 may impact network penetration testing and how networks may or may not be more secure because of IPv6.  Lets be clear, anyone telling you that IPv6 makes penetration testing harder doesn’t understand the first thing about real [...]

Comments Off on Netragard’s thoughts on Pentesting IPv6 vs IPv4

Bypassing Antivirus to Hack You

By |2020-03-31T10:34:06-04:00August 6th, 2010|

Many people assume that running antivirus software will protect them from malware (viruses, worms, trojans, etc), but in reality the software is only partially effective. This is true because antivirus software can only detect malware that it knows to look for. Anything that doesn’t match a [...]

Comments Off on Bypassing Antivirus to Hack You