
Introduction to Linux for Security Analysts
Posted on December 12th, 2017
This video provides a crash course introduction to Linux for security analysts. It is common for security analysts to enter the field with their Linux skills lacking. Linux provides a security analysts with such powerful data analysis capabilities using built-in utilities (Grep, Sed, Awk, Egrep, Sort, Uniq, etc.). This video hopefully gives someone new to […]
BSidesJXN 2017 – Improving Vulnerability Management
Posted on November 13th, 2017
BreakPoint Labs engineers had a great time this past weekend at BSidesJXN 2017 held at the Bomgar facility in Jackson, MS. Our engineers gave a talk titled “Adding Pentest Sauce to Your Vulnerability Management Recipe” – all about improving vulnerability management based on Red Team tips and tricks. BSidesJXN is a great example of why […]
Adding Pentest Sauce to your Vulnerability Management Recipe
Posted on August 6th, 2017
One question we get after performing a penetration test is “Why didn’t I see some of these vulnerabilities during our monthly vulnerability scans?” The truth of the matter is many flaws that both attackers and pentesters exploit do not typically show up in a Nessus, Nexpose, or [insert-vuln-scanner-name-here] scan. Most senior penetration testers and attackers […]
BreakPoint Labs Awarded GSA IT Schedule 70 Contract for Highly Adaptive Cybersecurity Services
Posted on February 22nd, 2017
Falls Church, VA – BreakPoint Labs (BPL), a Metropolitan Washington DC-based certified small business and cybersecurity services provider, is proud to announce their award of a General Services Administration (GSA) Schedule 70 contract. Included in the five (5)-year base, up to twenty (20)-year, contract are four (4) new Highly Adaptive Cybersecurity Services (HACS) Special […]
Bsides Philly 2016: Finding A Company’s BreakPoint
Posted on February 15th, 2017
BSides Philly is an information security conference that’s a volunteer organized event, hosted by and for the community, with a goal of advancing knowledge among security engineers. The conference was held on December 2nd and 3rd 2016 at the Drexel University Creese Student Lounge. Finding A Company’s BreakPoint The goal of this talk is to […]
5 Ways We Get on Your Network: Relaying SMB Credentials
Posted on February 1st, 2017
Once your on an internal network your next thought maybe how can I man in the middle (MITM) systems on the network? OR How can I identify vulnerabilities in what appears to be a fully patched environment across systems? One way that often works while performing an internal pentest is to intercept broadcast protocols like […]