• Facebook
  • Twitter
  • Instagram
  • Linkedin
  • Youtube
  • Home
  • Products
    • RidgeBot Overview
    • Methodology: Penetration Testing
    • Methodology: Adversary Cyber Emulation
    • 10 RidgeBot Features
    • Surviving Ransomware
    • Post Exploitation
    • OWASP Top 10 Compliance
    • Apache log4j Vulnerability
  • Resources
  • Use Cases
  • Partners
    • Overview
    • Technology Partners
    • Partner Portal Login
  • Services
  • Blog
  • About Us
  • English
    • Español
    • Português
    • Italiano
Select Page
RidgeBOT Post-Exploitation Based on the Exploit of MSSQL {Part Two)

RidgeBOT Post-Exploitation Based on the Exploit of MSSQL {Part Two)

by Ridge Security Marketing | Apr 30, 2020 | Pen Test Technical Tips

In part one, we introduced “stealthier” Windows-based tools to detect MSSQL service: detect MSSQL instance based on the working group and detect MSSQL instance in a windows domain environment. In this blog, we share the Exploit of MSSQL, enable the target...
How Does the RidgeBOT Pass CAPTCHAs in a Pen Test?

How Does the RidgeBOT Pass CAPTCHAs in a Pen Test?

by Ridge Security Marketing | Apr 20, 2020 | AI in Automated Pen Test

CAPTCHAs—Completely Automated Public Turing test to tell Computers and Humans Apart. To train a computer or “robot” to become an ethical hacker is not a trivial task. The obvious question that comes to mind is, “how can it pass CAPTCHAs—automated...
RidgeBOT Post-Exploitation Based on the Exploit of MSSQL (Part One)

RidgeBOT Post-Exploitation Based on the Exploit of MSSQL (Part One)

by Ridge Security Marketing | Apr 20, 2020 | Pen Test Technical Tips

In penetration testing, we often encounter an MSSQL database. Usually, we will use an extended procedure like xp_cmdshell to perform privilege escalation or execute system commands. However, when xp_cmdshell is unused, what other methods can we leverage? We are...
Transforming Security Validation with RidgeBOT

Transforming Security Validation with RidgeBOT

by Ridge Security Marketing | Apr 13, 2020 | RidgeBOT

            Ridge Security is transforming Security Validation with RidgeBot, an Intelligent Security Validation Robot. RidgeBot’s are modeled using techniques utilized by literally millions of hackers that penetrate systems. When...
Ethical Hacking: Inside the World of White Hat Hackers

Ethical Hacking: Inside the World of White Hat Hackers

by Ridge Security Marketing | Apr 8, 2020 | Uncategorized

White Hat Hackers can help your company stay on the offensive against cyber attackers, and save your data and money. http://bit.ly/39cgJsl#pentesting #whitehat Source: builtin.com
« Older Entries

Recent Posts

  • Automated Pen Testing Continually Scans, Exploits, Validates and Reports CVEs
  • Ridge Security Receives Customer Favorite Vendor of the Year Award at InfoSec SEE for Its Automated Penetration Testing
  • Overview of ProxyLogon Vulnerability in Microsoft Exchange Servers
  • Ad Hoc or Managed Penetration Testing: Which One Is Best for You?
  • Ridge Security and SYNNEX Corporation Announce Distribution Agreement to Expand LATAM Markets

Archives

  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • October 2019
  • July 2019
  • April 2019

RidgeSecurity.ai

  • Home
  • Products
  • Resources
  • Use Cases
  • Partners
  • Services
  • Blog
  • About Us

© 2022 Ridge Security, Inc.    Privacy Policy   Terms and Conditions