How to Get Hacked in 5 Steps

How to Get Hacked in 5 Steps

There are tons of articles out there outlining how to secure your network and which defensive measure to take in order to make sure your business does not lose business data or customer data. Being that Black Harbor specializes in offensive security, we are going to...
Cracking WiFi Protected Access (WPA) Pre-Shared Key (PSK)

Cracking WiFi Protected Access (WPA) Pre-Shared Key (PSK)

This blog post was originally published on John Tagita’s personal site, https://attackd0gz.com, on November 5, 2019. That post can be found here: https://attackd0gz.com/2019/11/05/how-to-crack-wifi-protected-access-wpa-pre-shared-key-psk/ This is going to be a short...

What is a Penetration Test and Why is it important?

Current Threats to Business Cyber Criminals are becoming more and more adept at extorting dollars out of business’ pockets. With the rise in ransomware and cryptomining malware, the avenues for these bad actors to achieve success is extremely broad. The problem for...