Pentesting and IT Security Blog

Our passion for testing and defending infrastructures, applications and companies often leads us to the point where we want to share our thoughts and experience with the world. Here you can read all about our exploits and research and enjoy our posts, from useful howtos, to published CVEs, management strategies, new exciting tools and much more. As a provider of offensive and defensive IT services, we always welcome readers to reach out to us and ask questions or provide feedback, be it about our blog or our services, which include web-application and network penetration tests, system defense and hardening and management consulting, among others.

This post is only available in german. Freitag, 03. Mai 2019 09:49 Im April haben wir auf unserem Youtube Channel zwei Videos zu Veracrypt veröffentlicht. Darin wird gezeigt, wie mit Veracrypt sowohl gesammte Partitionen oder Festplatten, als auch Teilbereiche einer Festplatte als so genann...

Now matter how much you want to secure your mail server, to be able to actually communicate with your customers and partners, you will have to face the ugly truth that enforcing STARTTLS might not be the best idea from a business perspective. Using opportunistic encryption, meaning to encrypt mail...

Internal encryption in company networks is important and something that's done relatively easy. By creating your own certificate authority (CA) and signing your server certificates with it, you can establish a centralized point of trust on all your devices, making it much more easy for you to mainta...