Posted on Monday, September 22nd, 2014 by Nick Shapley.
For a pen tester, the port scanning tool Nmap is used almost on a daily basis, however it can be rather handy for IT managers and system administrators who want to identify common “security gotchas” on their network. Let’s start with the Simple Network Management Protocol, more commonly known as SNMP, or to a select […] Read More
Posted on Friday, September 19th, 2014 by David Lodge.
This hack demo shows you the perils of rogue apps and the value of understanding permissions. Video Transcript ▾ Hello and welcome to the security kitchen. My name is Dave and I’m here to show you how we can use Android accessibility events to steal a PIN from a locked device. To set the scene […] Read More
Posted on Friday, September 19th, 2014 by Pedro Venda.
I’m going to show you how socat is used to solve real-life penetration testing problems. Socat is a fantastically versatile Swiss army knife for connecting all sorts of sockets, be they TCP, UDP, IPv4, IPv6, SSL-wrapped, unix sockets, raw sockets, etc. There are six examples here, varying in complexity from a simple TCP connection to […] Read More
<< Older posts