• Facebook
  • Twitter
  • Instagram
  • Linkedin
  • Youtube
  • Home
  • Products
    • RidgeBot
      • Overview
      • Methodology: Penetration Testing
      • Methodology: Adversary Cyber Emulation
      • 10 RidgeBot Features
      • Surviving Ransomware
      • Post Exploitation
      • OWASP Top 10 Compliance
      • Apache log4j Vulnerability
      • MSSP/MDR Solution
    • RidgeShield
    • PurpleRidge
  • Resources
  • Use Cases
  • Partners
    • Overview
    • Technology Partners
    • Partner Portal Login
  • Services
  • Blog
  • About Us
  • English
    • Español
    • Português
    • Italiano
Select Page
How to Implement EternalBlue Exploit in RidgeBot

How to Implement EternalBlue Exploit in RidgeBot

by Ridge Security Marketing | May 21, 2020 | Pen Test Technical Tips

In hacking, a shellcode is a small piece of code used as the payload in the exploitation. It is called “shellcode” because it typically starts a command shell from which an attacker can control the compromised...
Demonstration of an Iterative Attack to MYSQL server with RidgeBot  – a fully automated penetration testing system

Demonstration of an Iterative Attack to MYSQL server with RidgeBot – a fully automated penetration testing system

by Ridge Security Marketing | May 18, 2020 | Automated Pen Test Demo

Many exploit tools available today are only able to take one-step attack at a time. In order to achieve a multi-layered or iterative attack, Pen testers need to link the dots and command the system. Unlike these tools, RidgeBot, a fully automated penentration testing...
How to Apply Neuro Network-Like Techniques to Asset Profiling in an Automated Penetration Testing?

How to Apply Neuro Network-Like Techniques to Asset Profiling in an Automated Penetration Testing?

by Ridge Security Marketing | May 7, 2020 | AI in Automated Pen Test

The asset profile is a starting point for planning an attack chain and it is an important foundation. Many decisions made in the attack chain are actually based on the results of the asset profile. Therefore, the asset profiling is to understand the target thoroughly...
End Covid-19, End Weak Passwords

End Covid-19, End Weak Passwords

by Ridge Security Marketing | May 6, 2020 | Automated Pen Test Demo

On April 22nd, Washington Post reported nearly 25,000 email addresses and passwords allegedly from NIH, WHO, Gates Foundation, and others, are dumped online. According to a cybersecurity expert, 48 people from WHO have ‘password’ as their password. Others had used...

Recent Posts

  • Protect Your Business from the Growing Ransomware Variants 
  • RidgeBot DAST and IAST Capabilities Bolster DevSecOps Security Postures 
  • Common Mistakes in Pen Testing and How to Avoid Them
  • Ridge Security Takes Home Two Coveted Global InfoSec Awards – By Business Wire
  • Announcing RidgeShield: The Comprehensive Cloud Workload Protection and Testing Solution from Ridge Security – By Business Wire

Archives

  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • October 2019
  • July 2019
  • April 2019

RidgeSecurity.ai

  • Home
  • Products
  • Resources
  • Use Cases
  • Partners
  • Services
  • Blog
  • About Us
© 2023 Ridge Security, Inc.    Privacy Policy   Terms and Conditions