Polito Inc logo
  • Services

    • All Services
    • Cyber Readiness Assessment
    • Digital Forensics
    • Incident Response
    • Intrusion Detection & Prevention
    • Mobile App Security
    • Penetration Testing
    • Threat Hunting
    • Web App Security
    • Retainer
    • Training
  • Industries

    • All Industries
    • Legal Sector
    • Financial Sector
    • Healthcare Sector
    • Energy Sector
    • Public Sector
  • Why Polito

  • Contact

  • About

    • About Us
    • News
    • Our Team
    • Careers
  • Blog

  • More

    Use tab to navigate through the menu items.
    • All Posts
    • SIEM
    • Threat Hunting
    • Vulnerability Assessments
    • Dark Web
    • Events
    • Digital Forensics
    • Business Continuity / Disaster Reco
    • Antivirus
    • Botnets
    • Exploits
    • Malware
    • Mobile Apps
    • Penetration Testing
    • Tools
    • Cyber Industry
    • Phishing
    • Social Engineering
    • CTF
    Search
    Esther Matut
    • Mar 29
    • 8 min

    Wicked6 US Cyber Range CTF: Ladies of Space Cows

    On March 23rd and 24th, 2022, Wicked6, sponsored by many companies produced a special 24 hour global women's only CTF event virtually.
    Wicked6 US Cyber Range CTF: Ladies of Space Cows
    Fred Mastrippolito
    • Jan 31
    • 2 min

    Introducing Hash Exporter for X-Ways: Automate Your Hash Lists

    Polito Inc. is pleased to announce that we are releasing the Hash Exporter extension for X-Ways. Hash Exporter helps automate hash extract
    Introducing Hash Exporter for X-Ways: Automate Your Hash Lists
    Nihaal Prasad
    • Oct 5, 2021
    • 6 min

    Return to Libc: Linux Exploit Development

    This blog post will cover how to conduct a ret2libc attack. The ret2libc technique is a tactic used in Linux exploit development that allows
    Return to Libc: Linux Exploit Development
    Nihaal Prasad
    • Aug 10, 2021
    • 7 min

    How to go Phishing with Gophish

    How to conduct basic phishing campaigns using Gophish, an open-source tool for testing an organization’s vulnerability to phishing.
    How to go Phishing with Gophish
    Mattia Campagnano
    • Feb 23, 2021
    • 4 min

    Top 3 Reasons Why Organizations Should Get a Penetration Test Today

    Cybersecurity breaches and other incidents have become increasingly frequent and more impactful over the last year. In a recent high-profile
    Top 3 Reasons Why Organizations Should Get a Penetration Test Today
    Liana Parakesyan
    • Nov 4, 2020
    • 6 min

    Masterful Policies and Compliance: Industries, Policies, Regulations, and How to Get Started

    Policy assessments should be considered as a cybersecurity best practice and should be conducted annually with other assessments such as vul
    Masterful Policies and Compliance: Industries, Policies, Regulations, and How to Get Started
    Jeffrey Magloire
    • Oct 19, 2020
    • 4 min

    Dynamic Analysis Using Autopsy - Part 1

    This blog is going to walk you through using the OPSWAT MetaDefender service with the Autopsy digital forensic tool. The first step would be
    Dynamic Analysis Using Autopsy - Part 1
    Daniel Chen
    • Aug 5, 2020
    • 3 min

    Enhancing Digital Forensics with X-Ways X-Tensions: Metadefender Plugin

    To start, you’ll need your MetaDefender Cloud API key ready. You can sign up for MetaDefender’s free API key at opswat.com.  You can downloa
    Enhancing Digital Forensics with X-Ways X-Tensions: Metadefender Plugin
    Mattia Campagnano & Wade Ma
    • Jul 14, 2020
    • 9 min

    Vulnerability Scanners and the SAINT Experience

    Vulnerability scanners assist in the identification and detection of vulnerabilities arising from misconfigurations or insecure coding with
    Vulnerability Scanners and the SAINT Experience
    Mattia Campagnano
    • May 20, 2020
    • 6 min

    Weaponizing Windows Binaries and Scripts (LOLBAS): What's Old Is New Again

    One of the latest trends in penetration testing and malware development is to weaponize the so-called Living Off the Land Binaries and Scrip
    Weaponizing Windows Binaries and Scripts (LOLBAS): What's Old Is New Again
    Peter Quach
    • Mar 18, 2020
    • 6 min

    Cybersecurity Tips to Get Through the Coronavirus Pandemic

    As we all learn to deal with this new, temporary norm, we must not sacrifice our convictions for strong cybersecurity. Hackers are currently
    Cybersecurity Tips to Get Through the Coronavirus Pandemic
    Wade Ma
    • Mar 3, 2020
    • 9 min

    Automated Obfuscation of Windows Malware and Exploits Using O-LLVM

    Today’s malware authors and exploit developers have automated methods of obfuscating their software, When these techniques are combined with
    Automated Obfuscation of Windows Malware and Exploits Using O-LLVM
    Mattia Campagnano
    • Feb 3, 2020
    • 9 min

    Ransomware Attacks Are on the Rise, Should You Pay the Ransom?

    However, sometimes the answer to this question cannot be so clear-cut. Much depends on how valuable the information being held for ransom is
    Ransomware Attacks Are on the Rise, Should You Pay the Ransom?
    Fred Mastrippolito
    • Jun 18, 2019
    • 2 min

    The CISO asked me to run Ransomware on his laptop

    The executive’s laptop had the very latest version of a cloud-based, next-generation antivirus endpoint detection and response software, whi
    The CISO asked me to run Ransomware on his laptop
    Liana Parakesyan
    • May 15, 2019
    • 7 min

    Wi-Fi Hacking: A How To for Penetration Testers

    To sniff Wi-Fi, we use Alfa USB Wi-Fi adapter which connects to laptop via USB. For longer range sniffing, the 16 dBi Yagi antenna can be co
    Wi-Fi Hacking: A How To for Penetration Testers
    Liana Parakesyan
    • Feb 21, 2019
    • 4 min

    Using Intezer Analyze to Reveal Malware Ancestry and Assist Incident Response and Forensic Investiga

    Today, much of the malware still operates via the same concept of infecting machines and spreading throughout networks. Due to this, it only
    Using Intezer Analyze to Reveal Malware Ancestry and Assist Incident Response and Forensic Investiga
    Ronny Thammasathiti
    • Feb 15, 2019
    • 2 min

    Polito, Inc. at the George Mason University Cyber Security Innovation Forum

    Speakers at the event were CEOs and Managing Directors from companies such as, Accenture Federal Services, RunSafe Security, George Mason Un
    Polito, Inc. at the George Mason University Cyber Security Innovation Forum
    Admin
    • Nov 16, 2018
    • 4 min

    Enhancing Digital Forensics with ReversingLabs Plugins: Now for X-Ways!

    At Polito Inc., our forensic experts often rely on X-Ways Forensics to rapidly acquire and analyze digital computer evidence. X-Ways Forensi
    Enhancing Digital Forensics with ReversingLabs Plugins: Now for X-Ways!
    Roman Romanenco
    • Apr 5, 2018
    • 8 min

    How To Explore The Dark Web: It's Easier Than You Think

    There is a lot of confusion over deep web vs. dark web; they are often used interchangeably, which is wrong. In essence the term “deep web”
    How To Explore The Dark Web: It's Easier Than You Think
    Liana Parakesyan
    • Mar 5, 2018
    • 3 min

    Enhancing Digital Forensics with ReversingLabs Hash Query Plugin for Autopsy

    Polito Inc. has partnered with ReversingLabs (RL) and has developed a plugin extension called ReversingLabs Lookup Utility for Autopsy. Auto
    Enhancing Digital Forensics with ReversingLabs Hash Query Plugin for Autopsy
    1
    23
    Contact Us
    Our Address

    5015 Observer Ln

    Woodbridge, VA 22192

    info@politoinc.com

    Call Us

    Tel:  571-969-7039

    • White LinkedIn Icon
    • White Facebook Icon
    • White Twitter Icon

    © 2021 by Polito, Inc. All rights reserved. Privacy Policy.