Central InfoSec Cyber Security

Central InfoSec Blog


Central InfoSec Blog

What is Penetration Testing

What is
Penetration Testing?

This article will help you understand what penetration testing is and why your organization needs it.

Read More
Central InfoSec Best Boutique Pen Test Company 2024 - Top Rated Pentesting Companies

Central InfoSec Named
Best Boutique Pen Test Company

2024 Global 100 Awards Winner
"Best Boutique Pen Test Company"

Read More
Penetration Testing with Nmap

Penetration Testing
with Nmap

Nmap is one of the many tools used during a penetration test. Learn the key features of Nmap.

Read More
KubeHound Cheat Sheet

KubeHound
Cheat Sheet

KubeHound can help you identify attack paths in your Kubernetes environment. Learn key queries.

Read More
Central InfoSec Best Red Team Companies

GoPhish Server
Setup

Setup a GoPhish server to run custom phishing campaigns and raise security awareness.

Read More
Central InfoSec Cyber Security

10 Things Every VP & Director Should Know About Cybersecurity

It is your responsibility to make sure appropriate and accurate information is communicated.

Read More
Tilix Setup Kali Linux

Tilix Setup
Kali Linux

Automate the installation of Tilix on Kali Linux for red teaming and penetration testing.

Read More
Central InfoSec Cyber Security Lock Picking Training

Lock Picking
Training

This physical security project brings awareness to physical security by training friends and family.

Read More
Central InfoSec Cyber Security

Why You Need
Third-Party Penetration Testing

Penetration testing, also known as pen testing, is one of the best security practices that you can take.

Read More
Penetration Testing Companies & Red Team Firms

15 Cybersecurity Tips For
Every CEO & CISO

CEOs and CISOs need to consider these items to run a business more effectively and more securely.

Read More
Central InfoSec Best Boutique Pen Test Company 2023 - Top Rated Pentesting Companies

Central InfoSec Named
Best Boutique Pen Test Company

2023 Global 100 Awards Winner
"Best Boutique Pen Test Company"

Read More
Central InfoSec Cyber Security

Why Web Application
Penetration Testing Is Necessary

Without web application penetration testing, applications leave your organization at risk.

Read More
Central InfoSec Cyber Security

GoPhish Slack Phishing
Credential Harvester

Add Slack notifications to GoPhish phishing campaigns to harvest user credentials.

Read More
Central InfoSec Cyber Security Trends of the Month

Cyber Security
Trends of the Month

Central InfoSec provides monthly cyber security trends to help you stay vigilant.

Read More
Central InfoSec Cyber Security Tip of the Week

Cyber Security
Tip of the Week

Central InfoSec provides a weekly cyber security tip to help you and your business stay safe.

Read More
Central InfoSec Best Boutique Pen Test Company - Top Rated Pentesting Companies

Central InfoSec Named
Best Boutique Pen Test Company

2022 Global 100 Awards Winner
"Best Boutique Pen Test Company"

Read More
Google Hacking

Open-Source Intelligence (OSINT)
Google Hacking

Google hacking uses advanced Google search operators to search for security holes.

Read More
Central InfoSec Best PenTest Company - Top Rated Pen-Testing Companies

Central InfoSec
Best Pen Test Firm

Corporate Excellence Awards Winner
"Best Pen Test Firm"

Read More
Best Web App Pen Test Company - Central InfoSec

Web Application Penetration Testing
Add & Track Burp Suite Issues

Add and track custom web application issues within Burp Suite.

Read More
Central InfoSec Cyber Security

Cobalt Strike Leaked Conti Ransomware Manual

The Cobalt Strike manual v2 active directory leaked from the Conti Ransomware Gang.

Read More
Best Pen Test Companies Central InfoSec - Top Rated Penetration Testing Company USA

Best Pen Test Companies
in the US

A list of the best boutique pen test companies and top rated penetration testing firms in the US.

Read More
Central InfoSec Cyber Security

8 Cybersecurity Actions Every Organization Should Take

Organizations need to take proactive actions to improve their overall security posture.

Read More
Central InfoSec Cyber Security

Web Application Penetration Testing
Active AutoProxy with Burp Suite

Automatically forward, intercept, and drop proxy requests while blocking ads and malware.

Read More
Central InfoSec Cyber Security

7 Steps to Improve Your Cybersecurity Awareness Program

Improve your cybersecurity awareness program by following these seven steps.

Read More
Central InfoSec Cyber Security

Cyber Security Predictions 2023 January Edition

Central InfoSec cyber security predictions for 2023 January edition.

Read More
Central InfoSec Cyber Security

Central InfoSec CTF
2022

Highlights from the Central InfoSec CTF 2022 including top CTF teams.

Read More
Central InfoSec Cyber Security

5 Best Cyber Security Companies
to Watch

Central InfoSec was named one of the
5 Best Cyber Security Companies.

Read More
Metasploit Setup

Metasploit Setup
& Initialization

Metasploit is the world's leading open-source penetration testing framework.

Read More
Best Red Team Company - Central InfoSec

Cobalt Strike Aggressor Scripts Phishing Profiler

This Cobalt Strike Aggressor Script gathers additional information during phishing campaigns.

Read More
Central InfoSec Cyber Security

7z
Crack

This script helps crack 7-Zip files including those 7-zip files that are included in the Central InfoSec CTF.

Read More
Central InfoSec Cyber Security

Central InfoSec
Top 10 Security Company

Central InfoSec was named one of the
10 Best Security Companies.

Read More
Central InfoSec Cyber Security

Lair Kali
Setup

Automate the installation of Lair for red teaming and penetration testing.

Read More
Central InfoSec Cyber Security

Aquatone Kali
Setup

Automate the installation of Aquatone for red teaming and penetration testing.

Read More
Central InfoSec Cyber Security - Top Rated Penetration Testing Company

Central InfoSec
Best Penetration Testing Leader

Best Cyber Security Pen Test Business Leader
- Global CEO Excellence Awards.

Read More
Central InfoSec Best Red Team Companies

Why You Need to Create a
Security-First Culture

All it takes is one employee to click a malicious link or unintentionally provide their credentials.

Read More
Best Penetration Testing Companies

Why Automated Penetration Testing is Not Enough

Learn why automated penetration testing can provide you with a false sense of security.

Read More
Central InfoSec Best Red Team Companies

Free Annual
Penetration Testing Schedule

If you want a secure business, you must maintain it year round. You may be asking what that means.

Read More
Central InfoSec Red Team

Central InfoSec
Ransomware Assessment

Central InfoSec Ransomware Assessment to evaluate your ability to detect and prevent ransomware attacks.

Read More
Central InfoSec Cyber Security

Lair Nmap Reporting
(LairReport)

Lair Reporting converts Nmap Lair JSON exports to CSV files.

Read More
Central InfoSec Penetration Testing

EDC Altoids Tin v1.0
Field Kit

Compact items that help overcome every day problems and help in unexpected situations.

Read More
Central InfoSec Best Red Team Companies

GoPhish Phishing Campaign Reporting (GoPhishReport)

GoPhishReport creates custom phishing campaign reports from GoPhish phishing campaigns.

Read More
Central InfoSec Cyber Security

Central InfoSec CTF
2021

Highlights from the Central InfoSec CTF 2021 including top CTF teams and individuals.

Read More
Central InfoSec Cyber Security

Lock Picking Challenge
Training Towers

This physical security project brings awareness to physical security by training friends and family.

Read More
Central InfoSec Cyber Security

Kali Linux Theme
Pre-2020

Customize Kali Linux for red teaming and penetration testing for pre-2020 systems.

Read More
Central InfoSec Cyber Security

Tilix Terminal Setup
Pre-2020

Tilix Penetration Testing Setup installs and customizes Tilix for pre-2020 systems.

Read More
Central InfoSec Cyber Security

Cyber Security Predictions for 2021

Central InfoSec Cyber Security Predictions for 2021 exclusive interview with CIO Review.

Read More
Central InfoSec Cyber Security

IP Address Sorter
(IPSort)

These one liners demonstrate quick and easy ways to sort IP addresses without large or complex scripts.

Read More
Central InfoSec Cyber Security

Passive Subdomain Scraper (SubScrape)

SubScrape automates the process of passively scraping subdomains for a given domain.

Read More
Central InfoSec Best Penetration Testing Company - Top Rated Penetration Testing Companies

Best Penetration Testing & Security Consulting Firm

Best Penetration Testing & Security Consulting Firm
- Corporate Excellence Awards.

Read More
Central InfoSec Cyber Security

Phishing Keylogger v2
(PhishLog)

PhishLog uses a live keylogger to capture credentials and bypass two-factor authentication (2FA).

Read More
Central InfoSec Cyber Security

SSL Certificate Generator for Phishing (PhishCert)

PhishCert automates the creation of a Let’s Encrypt SSL certificate using Certbot for phishing.

Read More
Central InfoSec Cyber Security

Send & Track Phishing Campaigns (PhishSend)

PhishSend sends phishing emails and tracks unique links that are clicked.

Read More
Central InfoSec Cyber Security

Phishing Campaign Reporting & Historical Metrics (PhishReport)

PhishReport manages phishing campaign reporting and historical metrics.

Read More
Central InfoSec Cyber Security

SSH Credential Harvester
(SshHarvester)

SSH Credential Harvester automates the setup of an SSH server that logs usernames and passwords.

Read More
Central InfoSec Cyber Security

Cobalt Strike Phishing Campaign Reporting (PhishReportCS)

PhishReportCS automates the reporting process for Cobalt Strike phishing campaigns.

Read More
Central InfoSec Cyber Security

VPN Server Setup
(VpnSetup)

VPN Server Setup automates the creation and configuration of an OpenVPN Server.

Read More
Central InfoSec Cyber Security

Central InfoSec
Top 10 Cybersecurity Company

Central InfoSec was named one of the Top 10 Most Promising Cybersecurity Consulting/Service Companies.

Read More
Central InfoSec Cyber Security

Central InfoSec CTF
Capture The Flag

Enjoy our free Capture The Flag which contains over 250 challenges and over 100 flags to capture.

Read More
Central InfoSec Cyber Security

Open Mail Relay Tester
(MailTest)

MailTest automates the testing of open mail relays which can be used for phishing.

Read More
Central InfoSec Cyber Security

Phishing Email Address Generator (PhishGen)

PhishGen generates email addresses using names scraped from social media sites.

Read More
Best Penetration Testing Companies

Why Automated Penetration Testing Companies are Not Enough

Learn why automated penetration testing companies are not enough to protect your business.

Read More
Central InfoSec Cyber Security

Mail Server Setup for Phishing (PhishServ)

PhishServ automates the setup of a mail server allowing restricted relaying for phishing.

Read More
Best Web Application Penetration Testing Companies - Central InfoSec

Phishing Keylogger v1
Credential Harvester

Phishing Keylogger v1 is a live keylogger that captures credentials and bypass 2FA.

Read More
Extend Kali Linux AWS EBS Volume File System Resize

Extend a Kali Linux File System on AWS

Extend and resize a Kali Linux file system after an AWS EBS volume resize disk.

Read More
Central InfoSec Best Pen Test Company

Best Pen Test Company
in the USA

Best Pen Test Company
in the USA

Read More

Central InfoSec Core Values

Quality

Performance

Honesty

Integrity

Innovation

Reliability

Contact Central InfoSec Today!

Don't wait for a data breach to invest into your cybersecurity.

Central InfoSec can uncover your vulnerabilities before the cyber criminals do!