Triaxiom Security
Partner with us to meet your Information Security needs.
  • About Us
  • Services
    • Penetration Testing
    • Compliance Audit
    • Strategic Consulting
  • Blog
    • Penetration Test
    • PCI Compliance
    • Best Practice
  • Contact Us
One area of confusion we run into every once in awhile centers around whether an external penetration test includes web application testing

Does an External Penetration Test Include Web Application Testing?

One question we still hear from time to time is: Does an external penetration test include web application testing? It’s a fair question and one that often confuses people, because the answer is, “kind of, but not exactly.” Let’s break it down further. What types of web application penetration testing are generally included in an […]

go wrong on an external penetration test

What Can Go Wrong on an External Penetration Test?

When organizations bring in a third party to perform an external penetration test, the expectation is a smooth, well-orchestrated engagement that yields actionable results. And in most cases—around 95% of the time—that’s exactly what happens. However, it’s important to recognize that penetration testing is not without risk or complexity, and things can go wrong on […]

External Penetration Test Logo

How Much Does an External Penetration Test Cost in 2025?

An external penetration test evaluates the perimeter security of your organization by simulating an attacker on the internet. The goal is to identify vulnerabilities in internet-facing systems, attempt to breach internal networks, or uncover publicly exposed information that could harm your reputation. (For more details, see our complete external penetration test guide.) Because it closely […]

OSINT - Open Source Intelligence

What Your OSINT Says About You

At the onset of any engagement, Triaxiom Security engineers will begin with research, often called Open Source Intelligence Gathering, or OSINT for short. OSINT is the process of gathering publicly available information from the internet to gain a deeper understanding of an organization, its technology stack, and any potential vulnerabilities. Security engineers often conduct this […]

CBBH

HTB CBBH – Course and Exam Review

After passing the eWPT, I was looking for another web application certification that might help to elevate my skills and help me to review web application penetration testing exploits and methodologies. I stumbled upon Hack the Box (HTB) Academy, which offered a Certified Bug Bounty Hunting (CBBH) course and exam. I looked over a couple […]

Bypass Duo MFA for RDP

Bypass Duo MFA for RDP

In this blog we are going to take a look at an often overlooked or under-appreciated method to bypass Duo MFA for RDP. As long as the attacker has administrative rights on the computer, this blog will demonstrate how it is possible to enable restricted admin mode, and subsequently bypass the multi-factor authentication (MFA) requirement […]

«‹ 3 4 5 6›»

Looking for something specific?

Recent Posts

  • hidden-dangers-in-cloudCommon Security Dangers Lurking in Cloud Environments
  • search-bar-6467429_1280Entrinsik Informer Username Enumeration – CVE-2025-65185
  • vCISO header imageThe Case for Using a Cybersecurity Strategic Consultant (vCISO)

Categories

Most Discussed

API Penetration Test AWS Best Practice Checklist Cloud Common Vulnerabilities comparison COMPLIANCE configuration review Core Values Cost Current Events Education External Penetration Test firewall HIPAA improvement Incident Response Internal Penetration Test methodology Passphrase Passwords Password Security PCI PCI DSS PCI QSA penetration test Physical Penetration Test Problems QSA Quick Tips Regulation Remediation Report Risk ROC SAQ Security Awareness Small Business SMB Social Engineering vetting vulnerability Web Application Penetration Test wireless
Back to top
Triaxiom Security
© 2025 Triaxiom Security, a division of Strata Information Group, Inc. All rights reserved.
Privacy Policy