Find the latest Webinar content from the Sprocket Testing Team.
Resources
All Resources

Library

Explore our collection of resources, including blog articles, webcasts, case studies, and eBooks.
Ahead of the Breach - Gary Lobermier, Lead Adversarial Security Engineer at Northwestern Mutual
May 01, 2026

Ahead of the Breach - Gary Lobermier, Lead Adversarial Security Engineer at Northwestern Mutual

Gary Lobermier of Northwestern Mutual on building purple team automation that validates hundreds of MITRE ATT&CK techniques daily.
Apr 29, 2026

Self-Propagating XSS: When Widget Frameworks Become Worm Vectors in Multi-Tenant Platforms

Discover how a self-propagating XSS worm exploits multi-tenant widget frameworks to autonomously spread across enterprise applications using legitimate API calls, bypassing CSP, evading audit trails, and surviving password changes.
Apr 23, 2026

Hook, Line, and Server

MFA doesn't stop session cookie replay. Endpoint detection doesn't catch fileless malware without behavioral analysis. Here's the full post-phishing kill chain and what actually stops it.
Apr 21, 2026

Cracking NTLMv1 SSP With Rainbow Tables

Step-by-step walkthrough of cracking NTLMv1-SSP hashes with rainbow tables, including how to coerce auth, disable ESS, recover NT hashes, and remediate.
Apr 16, 2026

Vulnerability Hunting a Retired App Part 2 - From File Write to SYSTEM

Discover how an unsanitized file write endpoint in Omega Enterprise Gateway escalates to SYSTEM-level code execution and what dead code reveals about real-world security bugs.
Apr 13, 2026

Context Is The Attack Surface

A successful prompt hack looks like your system working correctly for someone else. The mechanism that makes this possible is the same one you’re paying for.
1 2 3 4 5