
Search • Page 8/9
99 results for "unauthorized access"


![Read the article titled [New enterprise feature] Add sub-users and share your Pentest-Tools.com plan](/_vercel/image?url=https:%2F%2Fcontent.pentest-tools.com%2Fassets%2Fcontent%2Fenterprise-feature-add-sub-users%2Fadd-sub-users-enterprise-feature-pentest-tools.com-2.webp&w=1536&q=100)
[New enterprise feature] Add sub-users and share your Pentest-Tools.com plan
Working on a security project is always better when your team is involved. That’s why you can now add multiple users to your Pentest-Tools.com account and share the plan with your team members. The new feature allows the account owner (the parent user) to create sub-users and share access to their account.
- Author(s)
- Published at
- Updated at

How to simulate phishing attacks with the HTTP Request Logger
As a penetration tester or a Red Team security consultant, you probably deal with lots of challenges when you want to simulate phishing attacks using social engineering techniques. Because our team’s goal is to make your job easier by providing the right tools, we’ve put together a hands-on guide you can use straight away!
- Author(s)
- Published at
- Updated at

Black Hat Europe 2019 Highlights
We are extremely grateful and happy to find out how many users already know about our online platform each time we explore a new context. To know people around the world use Pentest-Tools.com on a daily basis to discover vulnerabilities in websites or networks drives us to achieve even more going forward. In this article, we share our recent experience at the Black Hat Europe 2019 conference and what we learned from it.
- Author(s)
- Published at
- Updated at

Capital One, CafePress, Suprema data breaches and their root causes
In this article, we discuss some of the most recent data breaches, what are their root causes, and how to better secure your most valuable personal information and other digital assets.
- Author(s)
- Published at
- Updated at

Analysis of recent Exim mail server vulnerabilities
For the past months, multiple critical vulnerabilities were found in Exim mail servers that could allow attackers to gain remote access and perform malicious activities: CVE-2019-16928, CVE-2019-15846, and CVE-2019-10149.
- Author(s)
- Published at
- Updated at

How to Perform Internal Network Scanning with Pentest-Tools.com
In this article, we show you how to scan hosts from your internal network using our security tools from Pentest-Tools.com. This is a new capability that we have recently added to our platform and it uses VPN tunnels to reach the internal networks.
- Author(s)
- Published at
- Updated at
![Read the article titled [New feature] Internal network scanning with Pentest-Tools.com](/_vercel/image?url=https:%2F%2Fcontent.pentest-tools.com%2Fassets%2Fcontent%2Finternal-network-scanning%2Finternal-network-scanning-feature-pentest-tools.com-.webp&w=1536&q=100)
[New feature] Internal network scanning with Pentest-Tools.com
To quickly discover potential vulnerabilities or evaluate your security posture, regular internal network scans are essential. To make this easier for you, we’ve added a new feature on Pentest-Tools.com!
- Author(s)
- Published at
- Updated at


BlueKeep, the Microsoft RDP vulnerability - What we know so far
BlueKeep is a critical security flaw found in Microsoft Remote Desktop Services that was making the headlines for the past two months. In this article, we explore the key facts about this vulnerability.
- Author(s)
- Published at
- Updated at
