Pentera Logo Pentera Logo White
resources
Feb 2026
LOLBins Against the Machine: Reverse Engineering at Machine Speed
Purpose Attackers can utilize Living Off the Land Binaries (LOLBins) to execute commands, evade detection,...
Read now
“Pentera helps us prioritize what truly matters and gives us confidence we are covering our global environment continuously.”
“Seeing a domain admin account cracked in production changed how we view internal exposure.”
“Pentera helped us advance our red team and continuously improve penetration testing.”
“Pentera makes it easier to focus on what is truly exploitable instead of chasing long vulnerability lists.”
“In a complex, large-scale environment, Pentera delivers the speed and visibility security teams need.”
“Pentera amplified our team’s performance and delivered measurable value to upper management.”
"Pentera allows us to tailor testing to each service, reduce time and costs, and shift our focus from simply finding vulnerabilities to actively helping our teams fix them.”

Rubén Alonso | Head of Secure
Development Unit, Telefonica

“I don’t think we’d be able to advance our red team without Pentera. If you’re looking to improve penetration testing, I would definitely recommend it.”

Owen Fuller | Cybersecurity Engineering
Manager, Casey’s

ON-DEMAND WEBINAR

The hacking games: Think like a hacker Pentera Labs x AppSec meetup

Webinars
Jul 13, 2023

This webinar explores how to think like a hacker by combining reconnaissance techniques, automation, and real-world bug bounty experience. The speakers demonstrate how to uncover hidden assets and prioritize CVEs intelligently. By blending structured testing with hacker-driven curiosity, organizations can move toward proactive defense.

This session explores offensive security methodologies drawn from years of penetration testing, red teaming, vulnerability research, and bug bounty experience. It presents techniques for uncovering hidden assets, exposed replicas, and overlooked entry points using search tokens, certificate data, public repositories, response databases such as Shodan and Censys, and fuzzing approaches. The focus is on expanding visibility beyond known production applications to identify forgotten systems and secret APIs that attackers frequently exploit.

The webinar also examines automating CVE prioritization using scripting, scoring systems, public data sources, and static code analysis to focus remediation on what matters most. It contrasts traditional penetration testing with the bug bounty mindset, explaining how hacker-driven curiosity and automation can strengthen proactive defense and help organizations move toward attacker-minded security practices.