Port 65536/tcp Discovered in the Wild

Until now, the global security community believed that TCP ports end at 65535. This assumption was widely accepted, documented, and implemented in virtually every scanner on the market. It is rooted in a simple math problem involving only 0 and 1. The calculation appeared sound, was easy to implement, and therefore became an unquestioned industry … [Read more…]

Requirements for a TISAX Penetration Test

TISAX (Trusted Information Security Assessment Exchange) is the industry-specific security standard of the automotive sector – developed by the VDA and operated by the ENX Association. It ensures that companies demonstrably meet a high level of information security and can reliably share this status with their partners. As part of TISAX, the regular execution of … [Read more…]

PTDoc – Documentation and Reporting for Penetration Tests

The binsec GmbH relies on PTDoc® for its penetration tests – a specialized tool for structured penetration testing and professional report generation. PTDoc was developed by binsec systems GmbH. The idea for PTDoc emerged during the growth of the binsec team: How can quality remain consistently high when individual penetration testers have different personal focus … [Read more…]

NIS2 and Penetration Testing – Mandatory or Optional?

The new NIS2 Directive of the EU has been in force since early 2023. It no longer applies only to traditional critical infrastructure operators (KRITIS), but now covers a wide range of important entities, including: The NIS2 Directive does not explicitly mandate penetration testing, but it requires measures that are hardly feasible or verifiable without … [Read more…]

What Personal Data Is Processed During a Penetration Test?

The specific personal data processed during a penetration test largely depends on the target of the test. In general, the following categories can be distinguished: 1. Customer Points of Contact There’s no way around it: the pentester needs contact persons. Typically, this involves processing names, job titles, business email addresses, and phone numbers — stored … [Read more…]

Search for Subdomains of a Domain online

Subdomains often reveal which internal systems, websites, or platforms a company operates. Finding subdomains is an important part of security assessments, penetration tests, or general research, as it can uncover potential attack surfaces that might otherwise remain hidden. The SubDomainFinder from binsec.tools identifies subdomains of a domain by combining several methods:

The Scam “Invitation to Tender With Emirates Group” vendor.registration@theemirategroup.com

On 11th of February 2025 binsec GmbH received an “Invitation to Tender With Emirates Group” from vendor.registration@theemirategroup.com. This alleged tender is a case of targeted Advance Fee Fraud. I explicitly warn against responding to emails from this domain or making any payments. This is a deceptive scam that misappropriates the identity of the legitimate Emirates … [Read more…]