• Facebook
  • Twitter
  • Instagram
  • Linkedin
  • Youtube
  • Home
  • Products
    • RidgeBot Overview
    • Methodology: Penetration Testing
    • Methodology: Adversary Cyber Emulation
    • 10 RidgeBot Features
    • Surviving Ransomware
    • Post Exploitation
    • OWASP Top 10 Compliance
    • Apache log4j Vulnerability
  • Resources
  • Use Cases
  • Partners
    • Overview
    • Technology Partners
    • Partner Portal Login
  • Services
  • Blog
  • About Us
  • English
    • Español
    • Português
    • Italiano
Select Page
How to Implement EternalBlue Exploit in RidgeBot

How to Implement EternalBlue Exploit in RidgeBot

by Ridge Security Marketing | May 21, 2020 | Pen Test Technical Tips

In hacking, a shellcode is a small piece of code used as the payload in the exploitation. It is called “shellcode” because it typically starts a command shell from which an attacker can control the compromised...
Demonstration of an Iterative Attack to MYSQL server with RidgeBot  – a fully automated penetration testing system

Demonstration of an Iterative Attack to MYSQL server with RidgeBot – a fully automated penetration testing system

by Ridge Security Marketing | May 18, 2020 | Automated Pen Test Demo

Many exploit tools available today are only able to take one-step attack at a time. In order to achieve a multi-layered or iterative attack, Pen testers need to link the dots and command the system. Unlike these tools, RidgeBot, a fully automated penentration testing...
How to Apply Neuro Network-Like Techniques to Asset Profiling in an Automated Penetration Testing?

How to Apply Neuro Network-Like Techniques to Asset Profiling in an Automated Penetration Testing?

by Ridge Security Marketing | May 7, 2020 | AI in Automated Pen Test

The asset profile is a starting point for planning an attack chain and it is an important foundation. Many decisions made in the attack chain are actually based on the results of the asset profile. Therefore, the asset profiling is to understand the target thoroughly...
End Covid-19, End Weak Passwords

End Covid-19, End Weak Passwords

by Ridge Security Marketing | May 6, 2020 | Automated Pen Test Demo

On April 22nd, Washington Post reported nearly 25,000 email addresses and passwords allegedly from NIH, WHO, Gates Foundation, and others, are dumped online. According to a cybersecurity expert, 48 people from WHO have ‘password’ as their password. Others had used...

Recent Posts

  • Automated Pen Testing Continually Scans, Exploits, Validates and Reports CVEs
  • Ridge Security Receives Customer Favorite Vendor of the Year Award at InfoSec SEE for Its Automated Penetration Testing
  • Overview of ProxyLogon Vulnerability in Microsoft Exchange Servers
  • Ad Hoc or Managed Penetration Testing: Which One Is Best for You?
  • Ridge Security and SYNNEX Corporation Announce Distribution Agreement to Expand LATAM Markets

Archives

  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • October 2019
  • July 2019
  • April 2019

RidgeSecurity.ai

  • Home
  • Products
  • Resources
  • Use Cases
  • Partners
  • Services
  • Blog
  • About Us

© 2022 Ridge Security, Inc.    Privacy Policy   Terms and Conditions