Archive for February 11, 2016

 

We’re Just Like the NSA, and Nothing Like Them

February 11, 2016

During penetration tests, and especially scoping calls, we often get quizzed about what secret, proprietary techniques we’ll use to gain access to privileged resources. Most folks assume they’re doing “good […]