Two vulnerabilities on the Proroute H685t-w 4G Router Authenticated command injection is possible through the admin interface Reflected Cross Site-Scripting is possible through the admin interface ...
Modern vessels are becoming increasingly connected. While it is unlikely that hackers could fully control a container ship ...
Swann is a home security company that provides a range of products including CCTV cameras, video doorbells, and alarms. A ...
We’re only as good as the people in our team, so we’re always looking for great people. Maybe that’s you? PTP is acutely aware of the lack of diversity in our industry, and are keen to address that.
There are lots of guides online about how to set good passwords, however, fundamentally the best advise is to use a password manager, such as Bitwarden, 1Password, KeePass among others. These systems ...
Rooting is useful for Android assessments The process is relatively simple It will wipe all user data from the device and void any warranty For mobile testing, be it for apps or hardware, having ...
As ships get bigger, with more automation, fewer crew members, and more connectivity, the attack surface of a modern commercial vessel is becoming as complex and diverse as that of a connected car or ...
A walk-through of forensic data recovery Detailed example of how to retrieve potentially sensitive deleted data Includes location, sleep and activity tracking Understand the security and privacy ...
The threat landscape has never been more challenging. Significant numbers of highly skilled and motivated threat actors present a real danger. They have many potential goals such as penetrating your ...
Pen Test Partners recognises the need to protect end user privacy and security. We strongly believe in, and support, a coordinated and responsible approach to vulnerability disclosure. To this end, ...
Many mobile applications interact with an API server. Sniffing traffic between a device and the API server, or decompiling the mobile application will allow the workings of the API to be discovered ...
We have talented testers for virtually any scenario, a bold claim but true nonetheless. We’ve provided a sample of the types of pen testing we conduct, it’s not exhaustive but gives a flavour of what ...