Resources #_shelIntelApplication SecurityAudit / ComplianceAwards & RecognitionBlogCloud SecurityIT TrendsettersPassword CrackingPenetration TestingRemote AccessSecurity OperationsSynerCommVulnerability ManagementWi-Fi SecurityContinuous Pentesting and Its Many NamesContinuous Pentesting and Its Many NamesRead More Brian Judd | Feb 5, 2024 Strengthening Healthcare DefensesStrengthening Healthcare DefensesRead More Brian Judd | Jan 17, 2024 Spoofing Command Line Arguments to Dump LSASS in RustSpoofing Command Line Arguments to Dump LSASS in RustRead More Dylan Reuter | Dec 15, 2023 The Future of Business Applications and Data Center Access: Insights from SynerComm’s IT SummitThe Future of Business Applications and Data Center Access: Insights from SynerComm’s IT SummitRead More SynerComm | Oct 27, 2023 Navigating the Skies: TSA’s New Cybersecurity Requirements for AirlinesNavigating the Skies: TSA’s New Cybersecurity Requirements for AirlinesRead More Brian Judd | Oct 13, 2023 Creating a Rootkit to Inject into a Protected Process and Dump LSASSCreating a Rootkit to Inject into a Protected Process and Dump LSASSRead More admin | Sep 11, 2023 DEF CON 31 and Building A Wi-Fi Deauthentication DetectorDEF CON 31 and Building A Wi-Fi Deauthentication DetectorRead More admin | Sep 5, 2023 Rotating Your Pentesting Vendor Is A Mistake!Rotating Your Pentesting Vendor Is A Mistake!Read More Brian Judd | Aug 30, 2023 Fun with AD CS from Windows Command LineFun with AD CS from Windows Command LineRead More Dylan Webb | Apr 17, 2023 Common Cybersecurity Pitfalls to Avoid in 2023Common Cybersecurity Pitfalls to Avoid in 2023Read More SynerComm | Apr 17, 2023 Using API Hooking to Dump LSASS with Task Manager UndetectedUsing API Hooking to Dump LSASS with Task Manager UndetectedRead More Dylan Reuter | Apr 10, 2023 Infographic: Password Best PracticesInfographic: Password Best PracticesRead More SynerComm | Apr 7, 2023 Executing Shellcode with Rust, AES-256, and a Gnome PhotoExecuting Shellcode with Rust, AES-256, and a Gnome PhotoRead More Alex Philiotis | Apr 5, 2023 Is Your Outdated Infrastructure Holding Your Business Back?Is Your Outdated Infrastructure Holding Your Business Back?Read More SynerComm | Apr 3, 2023 Understanding Cloud Security Management PostureUnderstanding Cloud Security Management PostureRead More SynerComm | Mar 13, 2023 Scheduled Tasks With Lucee: Abusing Built In Functionality For Command ExecutionScheduled Tasks With Lucee: Abusing Built In Functionality For Command ExecutionRead More Alex Philiotis | Mar 6, 2023 Cybersecurity- What Are The Top Attack Trends In 2023?Cybersecurity- What Are The Top Attack Trends In 2023?Read More admin | Feb 23, 2023 Attacks on AD CS and the Impact on BusinessAttacks on AD CS and the Impact on BusinessRead More admin | Feb 9, 2023 Connections And Vulnerabilities -What Should Your Business Know?Connections And Vulnerabilities -What Should Your Business Know?Read More SynerComm | Jan 5, 2023 Why QR Codes Are No Different From Spam EmailWhy QR Codes Are No Different From Spam EmailRead More admin | Jan 5, 2023 What Does Chat GPT Think About Password Hash Assessments?What Does Chat GPT Think About Password Hash Assessments?Read More Brian Judd | Dec 27, 2022 What Makes a Champion DNS Security Solution?What Makes a Champion DNS Security Solution?Read More SynerComm | Dec 22, 2022 Cloud Security – How to Find (and Fix) Hidden VulnerabilitiesCloud Security – How to Find (and Fix) Hidden VulnerabilitiesRead More SynerComm | Dec 12, 2022 How Critical is Data Visibility for Network SecurityHow Critical is Data Visibility for Network SecurityRead More SynerComm | Dec 12, 2022 Common Pitfalls to Avoid in International IT Systems DeploymentCommon Pitfalls to Avoid in International IT Systems DeploymentRead More SynerComm | Dec 12, 2022 Password Hash Cracking with the NVIDIA RTX 4090Password Hash Cracking with the NVIDIA RTX 4090Read More Brian Judd | Nov 1, 2022 SynerComm Selected as SC Media Trust Award FinalistSynerComm Selected as SC Media Trust Award FinalistRead More SynerComm | Jun 16, 2022 shellntel.com has movedshellntel.com has movedRead More Brian Judd | May 24, 2022 Build a Cheap Gigabit Network TapBuild a Cheap Gigabit Network TapRead More SynerComm | May 23, 2022 Who Does the GLBA Safeguard Rule Apply To?Who Does the GLBA Safeguard Rule Apply To?Read More SynerComm | May 20, 2022 IT Trendsetters with Check PointIT Trendsetters with Check PointRead More SynerComm | May 2, 2022 IT Trendsetters episode with ExpelIT Trendsetters episode with ExpelRead More SynerComm | Mar 18, 2022 Surviving the Ransomware SiegeSurviving the Ransomware SiegeRead More Jeffrey Lemmermann | Sep 25, 2021 SynerComm Inc. Recognized as 2020 North America “Overall” Partner of the Year by Juniper NetworksSynerComm Inc. Recognized as 2020 North America “Overall” Partner of the Year by Juniper NetworksRead More admin | Apr 28, 2021 I have M365 for our Enterprise email… OMG how to deal with the outages?I have M365 for our Enterprise email… OMG how to deal with the outages?Read More admin | Mar 17, 2021 Time to Upgrade from Outdated Managed Vulnerability Scanning to Continuous Attack Surface ManagementTime to Upgrade from Outdated Managed Vulnerability Scanning to Continuous Attack Surface ManagementRead More Brian Judd | Jan 22, 2021 In Scope or Out of Scope?In Scope or Out of Scope?Read More SynerComm | Dec 24, 2020 Empowering Your Project Manager: The Benefits of an IT Focused Approach to LogisticsEmpowering Your Project Manager: The Benefits of an IT Focused Approach to LogisticsRead More SynerComm | Nov 22, 2020 The Benefits of a Partnership Built on TrustThe Benefits of a Partnership Built on TrustRead More admin | Oct 22, 2020 Penetration Testing Myths, Truths, & Best PracticesPenetration Testing Myths, Truths, & Best PracticesRead More admin | Aug 10, 2020 SynerComm Reboots a Security Staple with ‘Continuous’ PentestingSynerComm Reboots a Security Staple with ‘Continuous’ PentestingRead More admin | Aug 7, 2020 Incorporating Your Lessons Learned for Pandemic Contingency Planning ConsiderationsIncorporating Your Lessons Learned for Pandemic Contingency Planning ConsiderationsRead More SynerComm | Jul 15, 2020 We’ll get through this; how will it make us stronger? Make COVID-19 “lessons learned” a priorityWe’ll get through this; how will it make us stronger? Make COVID-19 “lessons learned” a priorityRead More admin | Jun 25, 2020 Building a PwnagotchiBuilding a PwnagotchiRead More admin | May 15, 2020 Continuous Penetration TestingContinuous Penetration TestingRead More SynerComm | Mar 31, 2020 People are People, but Where Can You Find Them When You Need Them?People are People, but Where Can You Find Them When You Need Them?Read More admin | Mar 25, 2020 Vendors Stepping Up in a Time of NeedVendors Stepping Up in a Time of NeedRead More admin | Mar 24, 2020 Remote Access RushRemote Access RushRead More admin | Mar 17, 2020 Are we prepared?Are we prepared?Read More Jeffrey Lemmermann | Mar 11, 2020 Stop Sharing Your Password with EveryoneStop Sharing Your Password with EveryoneRead More SynerComm | Jan 5, 2020 Cybersecurity Maturity Model Certification (CMMC)Cybersecurity Maturity Model Certification (CMMC)Read More admin | Sep 23, 2019 AWS Metadata Endpoint – How to Not Get Pwned like Capital OneAWS Metadata Endpoint – How to Not Get Pwned like Capital OneRead More SynerComm | Aug 27, 2019 Understanding HIPAA: PHI and Covered EntitiesUnderstanding HIPAA: PHI and Covered EntitiesRead More admin | Aug 23, 2019 Understanding HIPAA: Starting with the RulesUnderstanding HIPAA: Starting with the RulesRead More admin | Aug 1, 2019 Why Microsoft Office 365 Secure Score Isn’t EnoughWhy Microsoft Office 365 Secure Score Isn’t EnoughRead More Jeffrey Lemmermann | Jul 10, 2019 How to Approach the General Data Protection Regulation (GDPR) With a Security FrameworkHow to Approach the General Data Protection Regulation (GDPR) With a Security FrameworkRead More admin | Jul 1, 2019 Framework or Crash, the Choice is Yours!Framework or Crash, the Choice is Yours!Read More Jeffrey Lemmermann | Jun 21, 2019 Lessons Learned from Pentesting – What Should Keep You Up At NightLessons Learned from Pentesting – What Should Keep You Up At NightRead More Brian Judd | Jun 17, 2019 Characteristics of a Relevant Information Security Program: CommunicationsCharacteristics of a Relevant Information Security Program: CommunicationsRead More admin | Jun 5, 2019 Why 14 Characters?Why 14 Characters?Read More SynerComm | May 16, 2019 How to build a (2nd) 8 GPU password crackerHow to build a (2nd) 8 GPU password crackerRead More Brian Judd | Feb 20, 2019 DA 101 – Protecting your Domain Admin AccountDA 101 – Protecting your Domain Admin AccountRead More admin | Oct 22, 2018 OpenSSH < 7.7 - Username Enumeration ExploitOpenSSH < 7.7 - Username Enumeration ExploitRead More admin | Aug 21, 2018 Thoughts on Blocking Powershell.exeThoughts on Blocking Powershell.exeRead More admin | Mar 17, 2017 How to build a 8 GPU password crackerHow to build a 8 GPU password crackerRead More admin | Feb 14, 2017 The Upside Down – Ventures into the 5GHZ SpectrumThe Upside Down – Ventures into the 5GHZ SpectrumRead More admin | Oct 26, 2016 spin-up: Quickly Launch a Provisioned EC2 Attack Serverspin-up: Quickly Launch a Provisioned EC2 Attack ServerRead More admin | Oct 6, 2016 Luckystrike: An Evil Office Document Generator.Luckystrike: An Evil Office Document Generator.Read More admin | Sep 23, 2016 The Number One Pentesting Tool You’re Not UsingThe Number One Pentesting Tool You’re Not UsingRead More admin | Aug 4, 2016 Invoke-SMBAutoBrute.ps1 – Smart SMB Brute ForcingInvoke-SMBAutoBrute.ps1 – Smart SMB Brute ForcingRead More admin | Jul 8, 2016 Weaponizing NessusWeaponizing NessusRead More admin | Jun 8, 2016 Update to ProxyCannonUpdate to ProxyCannonRead More admin | May 25, 2016 VPN over DNSVPN over DNSRead More admin | May 12, 2016 Websocket Based Egress BusterWebsocket Based Egress BusterRead More SynerComm | Feb 22, 2016 Abusing Exchange Web Service – Part 1Abusing Exchange Web Service – Part 1Read More admin | Feb 19, 2016 Why Security Awareness Training FailsWhy Security Awareness Training FailsRead More admin | Feb 8, 2016 Assisted directory brute forcingAssisted directory brute forcingRead More admin | Oct 6, 2015 crEAP – Harvesting Users on Enterprise Wireless NetworkscrEAP – Harvesting Users on Enterprise Wireless NetworksRead More admin | Oct 1, 2015 [UPDATE] Creating your own private botnet for scanning.[UPDATE] Creating your own private botnet for scanning.Read More admin | Sep 26, 2015 Drone Code Execution (Part 1)Drone Code Execution (Part 1)Read More admin | Sep 25, 2015 PowerShell Memory Scraping for Credit CardsPowerShell Memory Scraping for Credit CardsRead More admin | Sep 18, 2015 Intro To Active Directory DelegationIntro To Active Directory DelegationRead More admin | Sep 9, 2015 Using PowerShell & Unicorn to Get PersistenceUsing PowerShell & Unicorn to Get PersistenceRead More admin | Jul 27, 2015 Creating your own private botnet for scanning.Creating your own private botnet for scanning.Read More admin | Jul 14, 2015 Circle City Con: 2015 CTF WriteupCircle City Con: 2015 CTF WriteupRead More admin | Jun 18, 2015 Qualys Scanner API In Powershell Including External Ticket CreationQualys Scanner API In Powershell Including External Ticket CreationRead More admin | Jun 12, 2015 Validating the Effectiveness of Your ControlsValidating the Effectiveness of Your ControlsRead More Brian Judd | Jun 12, 2015 Dragon: A Windows, non-binding, passive download / exec backdoorDragon: A Windows, non-binding, passive download / exec backdoorRead More admin | Jun 11, 2015 Subscribe to our newsletter for the latest updates in Cybersecurity. Subscribe Now!
Continuous Pentesting and Its Many NamesContinuous Pentesting and Its Many NamesRead More Brian Judd | Feb 5, 2024
Strengthening Healthcare DefensesStrengthening Healthcare DefensesRead More Brian Judd | Jan 17, 2024
Spoofing Command Line Arguments to Dump LSASS in RustSpoofing Command Line Arguments to Dump LSASS in RustRead More Dylan Reuter | Dec 15, 2023
The Future of Business Applications and Data Center Access: Insights from SynerComm’s IT SummitThe Future of Business Applications and Data Center Access: Insights from SynerComm’s IT SummitRead More SynerComm | Oct 27, 2023
Navigating the Skies: TSA’s New Cybersecurity Requirements for AirlinesNavigating the Skies: TSA’s New Cybersecurity Requirements for AirlinesRead More Brian Judd | Oct 13, 2023
Creating a Rootkit to Inject into a Protected Process and Dump LSASSCreating a Rootkit to Inject into a Protected Process and Dump LSASSRead More admin | Sep 11, 2023
DEF CON 31 and Building A Wi-Fi Deauthentication DetectorDEF CON 31 and Building A Wi-Fi Deauthentication DetectorRead More admin | Sep 5, 2023
Rotating Your Pentesting Vendor Is A Mistake!Rotating Your Pentesting Vendor Is A Mistake!Read More Brian Judd | Aug 30, 2023
Fun with AD CS from Windows Command LineFun with AD CS from Windows Command LineRead More Dylan Webb | Apr 17, 2023
Common Cybersecurity Pitfalls to Avoid in 2023Common Cybersecurity Pitfalls to Avoid in 2023Read More SynerComm | Apr 17, 2023
Using API Hooking to Dump LSASS with Task Manager UndetectedUsing API Hooking to Dump LSASS with Task Manager UndetectedRead More Dylan Reuter | Apr 10, 2023
Infographic: Password Best PracticesInfographic: Password Best PracticesRead More SynerComm | Apr 7, 2023
Executing Shellcode with Rust, AES-256, and a Gnome PhotoExecuting Shellcode with Rust, AES-256, and a Gnome PhotoRead More Alex Philiotis | Apr 5, 2023
Is Your Outdated Infrastructure Holding Your Business Back?Is Your Outdated Infrastructure Holding Your Business Back?Read More SynerComm | Apr 3, 2023
Understanding Cloud Security Management PostureUnderstanding Cloud Security Management PostureRead More SynerComm | Mar 13, 2023
Scheduled Tasks With Lucee: Abusing Built In Functionality For Command ExecutionScheduled Tasks With Lucee: Abusing Built In Functionality For Command ExecutionRead More Alex Philiotis | Mar 6, 2023
Cybersecurity- What Are The Top Attack Trends In 2023?Cybersecurity- What Are The Top Attack Trends In 2023?Read More admin | Feb 23, 2023
Attacks on AD CS and the Impact on BusinessAttacks on AD CS and the Impact on BusinessRead More admin | Feb 9, 2023
Connections And Vulnerabilities -What Should Your Business Know?Connections And Vulnerabilities -What Should Your Business Know?Read More SynerComm | Jan 5, 2023
Why QR Codes Are No Different From Spam EmailWhy QR Codes Are No Different From Spam EmailRead More admin | Jan 5, 2023
What Does Chat GPT Think About Password Hash Assessments?What Does Chat GPT Think About Password Hash Assessments?Read More Brian Judd | Dec 27, 2022
What Makes a Champion DNS Security Solution?What Makes a Champion DNS Security Solution?Read More SynerComm | Dec 22, 2022
Cloud Security – How to Find (and Fix) Hidden VulnerabilitiesCloud Security – How to Find (and Fix) Hidden VulnerabilitiesRead More SynerComm | Dec 12, 2022
How Critical is Data Visibility for Network SecurityHow Critical is Data Visibility for Network SecurityRead More SynerComm | Dec 12, 2022
Common Pitfalls to Avoid in International IT Systems DeploymentCommon Pitfalls to Avoid in International IT Systems DeploymentRead More SynerComm | Dec 12, 2022
Password Hash Cracking with the NVIDIA RTX 4090Password Hash Cracking with the NVIDIA RTX 4090Read More Brian Judd | Nov 1, 2022
SynerComm Selected as SC Media Trust Award FinalistSynerComm Selected as SC Media Trust Award FinalistRead More SynerComm | Jun 16, 2022
Build a Cheap Gigabit Network TapBuild a Cheap Gigabit Network TapRead More SynerComm | May 23, 2022
Who Does the GLBA Safeguard Rule Apply To?Who Does the GLBA Safeguard Rule Apply To?Read More SynerComm | May 20, 2022
IT Trendsetters episode with ExpelIT Trendsetters episode with ExpelRead More SynerComm | Mar 18, 2022
Surviving the Ransomware SiegeSurviving the Ransomware SiegeRead More Jeffrey Lemmermann | Sep 25, 2021
SynerComm Inc. Recognized as 2020 North America “Overall” Partner of the Year by Juniper NetworksSynerComm Inc. Recognized as 2020 North America “Overall” Partner of the Year by Juniper NetworksRead More admin | Apr 28, 2021
I have M365 for our Enterprise email… OMG how to deal with the outages?I have M365 for our Enterprise email… OMG how to deal with the outages?Read More admin | Mar 17, 2021
Time to Upgrade from Outdated Managed Vulnerability Scanning to Continuous Attack Surface ManagementTime to Upgrade from Outdated Managed Vulnerability Scanning to Continuous Attack Surface ManagementRead More Brian Judd | Jan 22, 2021
Empowering Your Project Manager: The Benefits of an IT Focused Approach to LogisticsEmpowering Your Project Manager: The Benefits of an IT Focused Approach to LogisticsRead More SynerComm | Nov 22, 2020
The Benefits of a Partnership Built on TrustThe Benefits of a Partnership Built on TrustRead More admin | Oct 22, 2020
Penetration Testing Myths, Truths, & Best PracticesPenetration Testing Myths, Truths, & Best PracticesRead More admin | Aug 10, 2020
SynerComm Reboots a Security Staple with ‘Continuous’ PentestingSynerComm Reboots a Security Staple with ‘Continuous’ PentestingRead More admin | Aug 7, 2020
Incorporating Your Lessons Learned for Pandemic Contingency Planning ConsiderationsIncorporating Your Lessons Learned for Pandemic Contingency Planning ConsiderationsRead More SynerComm | Jul 15, 2020
We’ll get through this; how will it make us stronger? Make COVID-19 “lessons learned” a priorityWe’ll get through this; how will it make us stronger? Make COVID-19 “lessons learned” a priorityRead More admin | Jun 25, 2020
People are People, but Where Can You Find Them When You Need Them?People are People, but Where Can You Find Them When You Need Them?Read More admin | Mar 25, 2020
Vendors Stepping Up in a Time of NeedVendors Stepping Up in a Time of NeedRead More admin | Mar 24, 2020
Stop Sharing Your Password with EveryoneStop Sharing Your Password with EveryoneRead More SynerComm | Jan 5, 2020
Cybersecurity Maturity Model Certification (CMMC)Cybersecurity Maturity Model Certification (CMMC)Read More admin | Sep 23, 2019
AWS Metadata Endpoint – How to Not Get Pwned like Capital OneAWS Metadata Endpoint – How to Not Get Pwned like Capital OneRead More SynerComm | Aug 27, 2019
Understanding HIPAA: PHI and Covered EntitiesUnderstanding HIPAA: PHI and Covered EntitiesRead More admin | Aug 23, 2019
Understanding HIPAA: Starting with the RulesUnderstanding HIPAA: Starting with the RulesRead More admin | Aug 1, 2019
Why Microsoft Office 365 Secure Score Isn’t EnoughWhy Microsoft Office 365 Secure Score Isn’t EnoughRead More Jeffrey Lemmermann | Jul 10, 2019
How to Approach the General Data Protection Regulation (GDPR) With a Security FrameworkHow to Approach the General Data Protection Regulation (GDPR) With a Security FrameworkRead More admin | Jul 1, 2019
Framework or Crash, the Choice is Yours!Framework or Crash, the Choice is Yours!Read More Jeffrey Lemmermann | Jun 21, 2019
Lessons Learned from Pentesting – What Should Keep You Up At NightLessons Learned from Pentesting – What Should Keep You Up At NightRead More Brian Judd | Jun 17, 2019
Characteristics of a Relevant Information Security Program: CommunicationsCharacteristics of a Relevant Information Security Program: CommunicationsRead More admin | Jun 5, 2019
How to build a (2nd) 8 GPU password crackerHow to build a (2nd) 8 GPU password crackerRead More Brian Judd | Feb 20, 2019
DA 101 – Protecting your Domain Admin AccountDA 101 – Protecting your Domain Admin AccountRead More admin | Oct 22, 2018
OpenSSH < 7.7 - Username Enumeration ExploitOpenSSH < 7.7 - Username Enumeration ExploitRead More admin | Aug 21, 2018
Thoughts on Blocking Powershell.exeThoughts on Blocking Powershell.exeRead More admin | Mar 17, 2017
How to build a 8 GPU password crackerHow to build a 8 GPU password crackerRead More admin | Feb 14, 2017
The Upside Down – Ventures into the 5GHZ SpectrumThe Upside Down – Ventures into the 5GHZ SpectrumRead More admin | Oct 26, 2016
spin-up: Quickly Launch a Provisioned EC2 Attack Serverspin-up: Quickly Launch a Provisioned EC2 Attack ServerRead More admin | Oct 6, 2016
Luckystrike: An Evil Office Document Generator.Luckystrike: An Evil Office Document Generator.Read More admin | Sep 23, 2016
The Number One Pentesting Tool You’re Not UsingThe Number One Pentesting Tool You’re Not UsingRead More admin | Aug 4, 2016
Invoke-SMBAutoBrute.ps1 – Smart SMB Brute ForcingInvoke-SMBAutoBrute.ps1 – Smart SMB Brute ForcingRead More admin | Jul 8, 2016
Abusing Exchange Web Service – Part 1Abusing Exchange Web Service – Part 1Read More admin | Feb 19, 2016
Why Security Awareness Training FailsWhy Security Awareness Training FailsRead More admin | Feb 8, 2016
crEAP – Harvesting Users on Enterprise Wireless NetworkscrEAP – Harvesting Users on Enterprise Wireless NetworksRead More admin | Oct 1, 2015
[UPDATE] Creating your own private botnet for scanning.[UPDATE] Creating your own private botnet for scanning.Read More admin | Sep 26, 2015
PowerShell Memory Scraping for Credit CardsPowerShell Memory Scraping for Credit CardsRead More admin | Sep 18, 2015
Intro To Active Directory DelegationIntro To Active Directory DelegationRead More admin | Sep 9, 2015
Using PowerShell & Unicorn to Get PersistenceUsing PowerShell & Unicorn to Get PersistenceRead More admin | Jul 27, 2015
Creating your own private botnet for scanning.Creating your own private botnet for scanning.Read More admin | Jul 14, 2015
Qualys Scanner API In Powershell Including External Ticket CreationQualys Scanner API In Powershell Including External Ticket CreationRead More admin | Jun 12, 2015
Validating the Effectiveness of Your ControlsValidating the Effectiveness of Your ControlsRead More Brian Judd | Jun 12, 2015
Dragon: A Windows, non-binding, passive download / exec backdoorDragon: A Windows, non-binding, passive download / exec backdoorRead More admin | Jun 11, 2015