Intruder is designed to be less noisy than other vulnerability scanners, but what does that mean for you? It can be difficult to know if a vulnerability scanner is any good, especially if you’re testing it against your own systems, which at this point in time,...
Your perimeter is different to the rest of your infrastructure, we treat it that way Intruder translates the output from enterprise-grade vulnerability scanning tools to provide perimeter-specific results. But why is that a good thing? Largely this is to do with two...
To make sure they’re getting the security they deserve, our customers often want to know what’s under the hood We didn’t start Intruder to re-invent the wheel. There were already lots of vulnerability scanners out there, and they all had a lot in...
What they are and why they’re an important part of keeping your systems safe Patrick Craston avatar Written by Patrick Craston Updated over a week ago On average, over 8,000 new vulnerabilities are discovered in common software and hardware platforms every year....
Introduction The Server Message Block (SMB) protocol is one of the most widely used, and oft misconfigured, network protocols around today. On our internal network penetration tests, we’re very commonly able to leverage these misconfigurations to uncover sensitive...
Introduction One of the most common issues we find on penetration testing and process review engagements is misconfigured, or completely missing, Domain-based Message Authentication Reporting & Conformance records, or DMARC for short. These simple DNS records...