Blog

Depth Security Blog

Blog

Penetration Testing
Industries
Case Studies
Company
Resources
Contact Us

Penetration Testing

https://depthsecurity.com/

Tools

H3

H4

H5
H6
Screen shot of connectivity and security settings for wireless infrastructure

Securing Wireless Infrastructure – Part 1

  Intro The wireless security landscape has remained largely unchanged since the development of Wi-Fi...
Read More
Depth Security logo

Indicators Of Poor Assessment Work

In the 11+ years Depth has been in business we’ve had the opportunity to see...
Read More
Screenshot of Spray 365 in action the Office 365 password spraying solution

Spray 365: A New Twist On Office 365 Password Spraying

TL;DR The current state of password spraying Office 365 accounts could benefit from new approaches...
Read More
Defeating Av

Classic API Unhooking To Bypass EDR Solutions

Intro This blog post will be covering the classic technique used to unhook Windows APIs...
Read More
Dllinjeciton

Reflective DLL Injection In C++

TL;DR Implant with our encrypted DLL -> allocates memory for the DLL -> put the...
Read More
Depth Security logo

Selecting A Penetration Testing Provider – PART 2

In last week’s blog, I started outlining some of the considerations when choosing a penetration testing...
Read More
Depth Security logo

Selecting A Penetration Testing Provider – PART 1

Recently, I received a call from a long-time friend of mine with who I had...
Read More
Applocker Image

Bypassing App Locker & CLM While Evading EDR

Introduction The  last blog post I wrote got way more recognition than I expected and...
Read More
Cartoon of a snake with word balloon talking about malicious documents

Obfuscating Malicious, Macro-Enabled Word Docs

Overview I was working on my OSEP certification when I was inspired to stop studying...
Read More

Fortify the Weaknesses in Your Infrastructure

Select Depth Security as your trusted partner for information security solutions. Benefit from our consulting services, leverage our expertise, connections, and experience to propel your business toward success. Together, we will enhance your cybersecurity strategy.