Call: 020 3095 0500
Twitter Linked In YouTube
Securing your business, together

More about Pen Test Partners ▾

How do you know that you aren’t compromised?

Posted on Friday, August 28th, 2015 by Jamie Riden.

Seriously. You have antivirus software and Windows Software Update Server and you get pen tests and so you probably know if there’s any issues in the externally facing infrastructure and applications as far as they’ve been tested. But there are a lot of different routes into an organisation, such as VPN or other administrative remote […] Read More

Grab the UI lock password from McAfee A/V, kill the service, send in the malware

Posted on Wednesday, August 26th, 2015 by David Lodge.

Once more I’m drifting away from what I usually write and going back to password cracking (don’t worry, more IoT stuff will be coming soon), and another real world situation. I’m stuck onsite testing a piece of software and I’m having real problems with the anti-virus solution doing its job and actually stopping me from […] Read More

How to extract sensitive plaintext data from Android memory

Posted on Wednesday, August 19th, 2015 by David Lodge.

Right, I’ve had enough of ripping IoT stuff apart for the moment. It’s time to review and share a technique that I’ve used on my favourite mobile operating system (Android, duh!), but haven’t had much use for as it requires the right circumstances. What I’m going to show you is how to directly dump memory […] Read More

<< Older posts