Home
About Us
Purpose, Vision, and Mission
Our History
Industries We Serve
Team
Corporate Social Responsibility
Why Choose PEN Consultants?
Our Approach
Our Unique Approach
Real-time Transparency
Purple Teaming
Reporting Levels
Contracting Options
Traditional Fixed-Price
Cybersecurity Unlimited
Subcontracting Services
Services
Vulnerability Scanning
Network Vulnerability Scan
Web Application Vulnerability Scan
Penetration Testing
Network Security Testing
Web Application Security Testing
Mobile Application Security Testing
Client-Side Application Security Testing
Wireless Security Testing
Specialized Services
Red Teaming
Purple Teaming
Compliance Testing
Phishing Assessment
Social Engineering Assessment
Pricing
Pricing
Non-Profits
Ongoing Engagements
Cybersecurity Unlimited
Resources
Choosing a Testing Firm
Referral Program
FAQs
Sample Security Testing Report
Monthly Chat: Ask us anything
Security Best Practices
Testimonials
Blog
Contact Us
Home
About Us
Purpose, Vision, and Mission
Our History
Industries We Serve
Team
Corporate Social Responsibility
Why Choose PEN Consultants?
Our Approach
Our Unique Approach
Real-time Transparency
Purple Teaming
Reporting Levels
Contracting Options
Traditional Fixed-Price
Cybersecurity Unlimited
Subcontracting Services
Services
Vulnerability Scanning
Network Vulnerability Scan
Web Application Vulnerability Scan
Penetration Testing
Network Security Testing
Web Application Security Testing
Mobile Application Security Testing
Client-Side Application Security Testing
Wireless Security Testing
Specialized Services
Red Teaming
Purple Teaming
Compliance Testing
Phishing Assessment
Social Engineering Assessment
Pricing
Non-Profits
Ongoing Engagements
Cybersecurity Unlimited
Resources
Choosing a Testing Firm
Referral Program
Frequently Asked Questions
Sample Security Testing Report
Monthly Chat: Ask us anything
Security Best Practices
Testimonials
Blog
Contact Us
Search for:
Search for:
Don’t Be a Victim:
Find your weaknesses before the criminals do.
PEN Consultants
can help!
Sitemap
Home
/
Sitemap
Posts
Security Best Practice
Understanding Hacker Methodology
ReStoried24
Detect & Respond
Sharpen Iron / Red Teaming
Q4 testing
Industries We Serve
Testing
Monthly Mentoring
What is a Pentest?
Vulnerability Disclosure Policy
Automated Pentests
Price vs Cost
Ongoing Testing
Securing WordPress
Methodology
The Hobby Lobby of Pentesting
Real-time Transparency
No Findings?
Transparency
SMB Signing
DMARC
Unique Experience
Stay Alert: Insights from Ancient Wisdom
Breaching a Network With Risk-Accepted Vulnerabilities - ICS2 Alamo Chapter Meeting - April 2024
Security Vendor Priorities
Unique to PEN Consultants - Summary
Timely Patch Management
Company Background & History
King Solomon and Authentication Security
3rd Party Vulnerabilities
About Robert
Mentoring Sessions
Annual Team Mission Trip (2023)
10 Ways to Secure Your WordPress Website in 2023
Annual Team Meet-Up (2023)
What is Penetration Testing?
Breaching a Network With Risk-Accepted Vulnerabilities
5 Benefits of Hiring an Ethical Hacker for Your Business
Vulnerability Disclosure Policy
Annual Team Meet-Up (2001)
Acquisition of PEN Consultants, LLC
SmartVestor Pro Experience
Webcast: The Data-Planet
Responsible Vulnerability Disclosure
User Enumeration vs Password Spraying
How do I get into Cybersecurity?
Your Schema is Showing
Building a Security Testing Business
HTTP Response Headers
MFA Implementation Attacks
Mass Call Record Collection – Cisco IP Phones
Coronavirus
Forced Password Rotation == Incrementing
MFA – Without the FUD
Paired Visitor/Escort Proximity Badges
Selecting a Reputable Security Testing Company
Vendor: Protect Your Code and Your Customers
Gray Box vs. Black Box vs. White Box Testing
Troublesome: HostGator and Microsoft
Red Teaming vs Penetration Testing vs Vulnerability Scanning vs Vulnerability Assessments
Presentation: RATs Without Borders
Threat Intelligence and Brand Monitoring
A Sensible Password Policy
Tachyon – A Security Pros Paradise
Binary File Patching – Echo Command
Burp+SSLintercept with Kali+Docker+Java+Python+Browser
Passwords in DB Logs
Finding Vulns in JARs with Spotbugs
A Vulnerability Disclosure Gone Wrong
Shields Down Security Testing
My Disclosure Process
Create a macOS High Sierra VM
Bruteforce and Join Skype Meetings
Presentation: Zero to Hero – A Red Team’s Journey
Presentation: Zero to Hero – Building a Red Team
Enumeration Vulnerability in Leading Email Providers
I Have Your PII
Exploiting Sandboxes
Sex Objects
Binary File Patching Scripts
AV Avoidance – Base64’ish Obfuscation
Hacker’s Ethics – My Changing Perspective
History of the Term EDR
Exposing Tanium: A Hacker’s Paradise
Local Admin on X -> Local Admin on All?
Breaking My Silence
Restricting to Local Admin != Mitigation
Crown Jewels: Monitoring vs Mitigating
Password Hash-Like Password
Citrix XenDesktop Exploit
Traditional IOCs Suck
Pages
test2
test
Traditional Fixed-Price
White Box Approach
Purple Teaming
Reporting Levels
Sales Development Representative
Sales Development Representative - Phase 2 - One-Way Interview
Sales Development Representative – Apply
My Calendar
Etn Speaker Category
Etn Category
Etn Tags
Events
My Bookings
Tags
Categories
Locations
San Antonio, TX
Austin, TX
Sitemap
Samples of raw outputs and reports
Real-time Transparency
Tech Writer Interview – Phase 0
Tech Writer Interview – Phase 5
Tech Writer Interview – Phase 3
Tech Writer Interview – Phase 2
Tech Writer Interview – Overview & Phase 1
Experienced Tester Position
Experienced Tester Position - Phase 2 - One-Way Interview
Experienced Tester Position - Apply
Vulnerability Disclosure Policy
Privacy Policy
Terms of Service
Pricing
Cybersecurity Blessings Program
Cybersecurity Unlimited
Non-Profits
Ongoing Engagements
Blog
Subcontracting Services
Contact Us
Testimonials
Resources
Security Best Practices
Choosing a Testing Firm
Monthly Chat w/PEN Consultants: Ask us anything
Frequently Asked Questions
Sample Security Testing Report
Referral Program
About Us
Why Choose PEN Consultants?
Team
Our History
Corporate Social Responsibility
Purpose, Vision, and Mission
Industries We Serve
Services
Phishing Assessment
Mobile Application Security Testing
Web Application Vulnerability Scan
Red Teaming
Client-Side Application Security Testing
Network Vulnerability Scan
Web Application Security Testing
Compliance Testing
Social Engineering Assessment
Wireless Security Testing
Network Security Testing
Home
Categories
Ethical Hacking
Exploits
Miscellaneous
Online Security
Tips & Tricks
Uncategorized
WordPress
Recent Data Breaches
Zacks (2024) - 11,994,223 breached accounts
LandAirSea - 337,373 breached accounts
Adopt Me Trading Values - 86,136 breached accounts
Youthmanual - 937,912 breached accounts
Thermomix Recipe World Forum - 3,123,439 breached accounts
Hakko Corporation - 9,665 breached accounts
PoinCampus - 89,116 breached accounts
1win - 96,166,543 breached accounts
DragonNest - 511,290 breached accounts
9Lives - 109,515 breached accounts
Protect Your Data - Contact Us
Data Breach News
R.I. House bill would expand notification obligations after
data...
Georgia Hospital Hit With Class Action Over 2024
Data Breach
-...
PPL Electric impacted by
data breach
| Pennsylvania News - WFMZ.com
WCS: More than 30K files impacted by PowerSchool
data breach
-...
New Era Life Insurance
Data Breach
Exposes Personal - GlobeNewswire
“Largest
data breach
in US history”: Three more lawsuits try to...
Beaufort County Schools continuing to help students and staff after...
Contact
First Name
*
Last Name
*
Email
*
Phone Number
*
Message
*
Website
Submit
PEN Consultants’ mission is to provide our clients with the highest quality Information and Cybersecurity Testing Services and deliver an actionable plan to protect their systems and data.
Resources
Connect With Us
+1 (830) 446-3411
info@penconsultants.com
13423 Blanco Rd #3124
San Antonio, TX 78216
Copyright ©
2025
PEN Consultants. All Rights Reserved.
View Sitemap
close
bars
angle-down
magnifier
cross
chevron-down