Pen Test Partners

We have been delivering cybersecurity expertise to a wide variety of industries and businesses since 2010

Pen Test PartnersPTP@infosec.exchange
2025-12-04

We often find built-in Windows defences disabled or misconfigured during assessments. Those same controls can help stop credential theft, boot-level malware, and memory attacks when properly configured.

In our latest blog post, Nicole walks through five Windows security features you should be using, explains what they do, why they matter, and how to check them on your systems.

📌pentestpartners.com/security-b

#windowssecurity #incidentresponse #endpointsecurity #cybersecurity #dfir

Pen Test PartnersPTP@infosec.exchange
2025-11-27

Android app testers and security engineers spend a lot of time dealing with Activities. The attack surface may look small, but a poorly configured Activities can expose data or let other apps do things they shouldn't. In this blog post, David Lodge explains how exported and debug Activities, weak WebView settings, and missing window security flags can pose security concerns.

📌 pentestpartners.com/security-b

#androidsecurity #cybersecurity #appsec #mobile #pentesting #infosec #securitytesting

Pen Test PartnersPTP@infosec.exchange
2025-11-25

Cloud compliance dashboards, CNAPP, and CSPM can all show green, but they don't show your entire attack surface.

The issue is not with the dashboards, but with the blind spots that lie outside their view, such as leaked developer personal access tokens or overprivileged pipelines that do not appear as non-compliant.

In this blog post, Joe Durbin looks at those gaps around tokens, pipelines, and third-party build services. He explains how human-led configuration reviews and custom threat actor simulations work alongside provider tools to show and test your actual attack surface.

📌pentestpartners.com/security-b

#cloudsecurity #cloudnative #devsecops #cnapp #cspm #cybersecurity

Pen Test PartnersPTP@infosec.exchange
2025-11-18

Misconfigured Kubernetes clusters are still one of the easiest ways attackers get in.

In this blog post, Craig Dowey breaks down the common Kubernetes misconfigurations we see in testing and shows how to lock down access, harden workloads, and enforce pod security admission across namespaces.

📌 Read here: pentestpartners.com/security-b

#kubernetes #cloudsecurity #devsecops #containers #cybersecurity

Pen Test PartnersPTP@infosec.exchange
2025-11-13

The real-time yield data from connected farm machinery could give attackers an early look at crop outputs before the market does, creating opportunities to manipulate or profit from commodity futures.

Such an attack is a real risk due to the various weaknesses in on-vehicle hardware, telematics units, and ag cloud APIs. Securing these systems will protect both farmers and the markets.

📌Read the blog post here:pentestpartners.com/security-b

#cybersecurity #agtech #iotsecurity #marketabuse #pentesting #connecteddevices

Pen Test PartnersPTP@infosec.exchange
2025-11-11

Finding your path into DFIR can be tough, but the community makes all the difference.

Our Joseph Williams shares his journey into Digital Forensics and Incident Response, with practical guidance for anyone looking to follow a similar route.

📌Read here to start your journey: pentestpartners.com/security-b

#DFIR #DigitalForensics #IncidentResponse #CyberSecurity #InfoSec #CareerDevelopment

Pen Test PartnersPTP@infosec.exchange
2025-11-04

The bar for CHECK testers is higher now. Charterships, tighter reporting reviews, and further guidance are now written into the scheme.

In this blog post, Lewis Cradduck explains what the new requirements mean for CHECK team leaders and members, how UK Cyber Security Council titles map to roles, and what changes NCSC has made in the scheme.

📌Read here: pentestpartners.com/security-b

#CHECK #NCSC #penetrationtesting #cybersecurity #UKCSC #Chartership

Pen Test PartnersPTP@infosec.exchange
2025-10-23

Exposing your home lab to the internet can open a path into your personal accounts and even your work assets.

In our latest blog post, Morgan Davis shows how to cut that risk with low-cost controls you can apply today, no enterprise tools needed. It teaches security thinking to help you reduce your attack surface and more.

📌 Read the guide here: pentestpartners.com/security-b

#cybersecurity #homelab #selfhosting #dockersecurity #linuxsecurity #infosec

Pen Test PartnersPTP@infosec.exchange
2025-10-21

Payroll diversion scams are still catching people out.

Attackers use LinkedIn to find out who works in payroll, and then they send convincing emails asking to change salary payment details. One forwarded message is all it takes for the fraud to seem real.

Our latest blog post by Dave Wardle explains how these scams work, the internal controls that stop them, and the LinkedIn privacy settings that make you harder to target.

📌Read here: pentestpartners.com/security-b

#cybersecurity #socialengineering #phishing #payroll #fraudprevention #infosec

Pen Test PartnersPTP@infosec.exchange
2025-10-17

When a breach occurs, it’s too late to wish you’d configured your logs...

Incident responders can only work with what’s there. Our latest blog post, written by Nicole, breaks down which logs provide the best chance of understanding what really happened and how to configure them before you need them, so you can get back to business as usual swiftly.

📌Read here: pentestpartners.com/security-b

#cybersecurity #incidentresponse #digitalforensics #sysmon #windowssecurity #infosec

Pen Test PartnersPTP@infosec.exchange
2025-10-14

Need Nmap in a locked-down container? Build it yourself... safely.

Ever tried running Nmap in a hardened environment only to hit missing libraries? Downloading random static binaries from the internet is a risky endeavour.

Our Gabriel Garcia Teran walks through building your own Nmap, and has made a Go interactive tool that lets you select flags and versions, then generates and runs the full build command.

No black-box downloads!

📌 Read here: pentestpartners.com/security-b

#cybersecurity #nmap #redteam #containersecurity #infosec #devsecops

Pen Test PartnersPTP@infosec.exchange
2025-10-02

Honeypots, when set up correctly, can become sensors that reveal attacker behavior. Add that with Suricata's rules and tuning, and they can provide clear, named alerts that cut away the noise.

Our Luke Davis set up a T-Pot with Suricata for 3 days, and it flagged probes for OpenSSH “regreSSHion” (CVE-2024-6387) and Treck TCP/IP (CVE-2020-11910), as well as highlighting cloud IP scanning.

Honeypots can be great as an early detection method and a hands-on training tool for students, SOC analysts, and Blue Teams to practise detection and response in safe environments.

📌Read the full blog here: pentestpartners.com/security-b

#CyberSecurity #Honeypots #Suricata #ThreatDetection #BlueTeam

Pen Test PartnersPTP@infosec.exchange
2025-09-16

Attackers abuse Discord webhooks for lightweight C2, but what does the cache leave behind?

In our latest blog post, Joseph Williams shows that a simple PowerShell beacon can send files and exfiltrate data to a Discord channel.

But what's in the cache? Attachments, thumbnails, and webhook URLs?

We have released a Discord Forensic Suite with a CLI parser and a GUI tool. It builds HTML and CSV timelines to reconstruct Discord activity after messages and files are deleted.

📌 Read here: pentestpartners.com/security-b

#DFIR #DFIRTools #DigitalForensics #DiscordSecurity #WebhookAbuse #C2 #Cybersecurity

Pen Test PartnersPTP@infosec.exchange
2025-09-04

In the final part of the Bluetooth hacking series, Sam Thom pulls it all together with his go-to BLE kit...

A Sniffle dongle and a Nordic dev kit give you everything you need to capture, interact, and even script Bluetooth traffic. The Nordic kit also runs an interactive Bluetooth shell, making it easier to learn and experiment.

📌Start hacking BLE here: pentestpartners.com/security-b

#Bluetooth #BLE #HardwareHacking #CyberSecurity #PenTesting #IoT

Pen Test PartnersPTP@infosec.exchange
2025-09-02

Broadcast receivers handle system events like boot, charging, or headset plug-ins, but they also come with risks if misconfigured.

In this blog post, David Lodge explains how broadcast receivers work and how to enumerate an app’s receivers...

📌pentestpartners.com/security-b

#CyberSecurity #AndroidSecurity #MobileSecurity #AppSec #ReverseEngineering #PenTesting

Pen Test PartnersPTP@infosec.exchange
2025-08-27

Ready to take Bluetooth Low Energy hacking a step further?

In part two, Sam Thom moves on from the free Android/Linux setup and brings in budget hardware. A ÂŁ20 Sonoff dongle for sniffing. A ÂŁ10 Nordic nRF52 for control.

With Sniffle and Wireshark, you can capture traffic. With nRFConnect, you can write to characteristics and make devices beep on command. It’s a cheap but powerful setup before we move on to advanced tools in the next post.

📌 pentestpartners.com/security-b

#BLEHacking #Bluetooth #BLE #HardwareHacking #CyberSecurity #PenTesting #Wireshark

Pen Test PartnersPTP@infosec.exchange
2025-08-21

Want to try Bluetooth Low Energy hacking but not sure where to begin?

This is the first post in a three-part series where Sam Thom takes a £2 key-finder tag and makes it beep by capturing and replaying its BLE traffic with free tools. It’s a simple, practical way to see how GATT, handles, and characteristics work without investing in expensive gear.

If you’ve been meaning to get into BLE, this is an easy starting point that sets you up for the more advanced tools and techniques we’ll cover in the series.

📌pentestpartners.com/security-b

#Bluetooth #BLE #HardwareHacking #CyberSecurity #PenTesting #Wireshark

Pen Test PartnersPTP@infosec.exchange
2025-08-15

Speculative plans in Terraform Cloud can open an attack path.🚨

On a Red Team engagement, we compromised a Terraform token with plan permissions. By adding a custom external data source, we ran code on the Terraform Cloud runner.

That exposed short-lived AWS and GCP credentials, letting us work outside the version control workflow.

Even VCS-backed workspaces do not stop this. The runner still holds the keys during a plan — and that is the risk.

Jack McBride explains the technique and how tighter token scopes and Sentinel allow lists can prevent it.

📌 pentestpartners.com/security-b

#CloudSecurity #RedTeam #Terraform #CyberSecurity #DevSecOps #AWS #GCP

Pen Test PartnersPTP@infosec.exchange
2025-08-05

You’re security testing AWS infrastructure. You’ve done the work and need to exfiltrate the evidence files. But there's no internet access and no inbound ports... 🤔

Here’s how to use AWS Services Systems Manager (SSM) to create a port forwarding session, access what you need, and securely exfiltrate data with a simple Python web server.

📌 Read the blog post here: pentestpartners.com/security-b

#AWS #CloudSecurity #PenTesting #CyberSecurity #SSM #Infosec #Python #RedTeam

Pen Test PartnersPTP@infosec.exchange
2025-07-31

Deleted a folder? Shellbags is the accessory you need...

They’re one of the most valuable forensic artifacts for tracing user activity in Windows, even if the folders are gone.

This blog post by our Joseph Williams walks through how Shellbags work, how to analyse them with tools like ShellBags Explorer, and what they reveal about user navigation through local, external, and network locations.

If you're in DFIR, this is one artifact you don't want to miss.

📌 Read the blog: pentestpartners.com/security-b

#DFIR #DigitalForensics #WindowsForensics #IncidentResponse #Shellbags #CyberSecurity #ForensicAnalysis

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst