The inherent assumption of security Feb 20, 2018 information security social engineering The inherent assumption of security This post is more of an observation than some of my other posts, its based around a theory that I have, which I call "the
Hack the Box - Shocker Walkthrough Jan 17, 2018 pentesting htb walkthrough Hack the Box - Shocker Walkthrough Walkthrough of Shocker (10.10.10.56) on Hack the box. nmap: nmap -v -p- -sC -sV -oA shocker 10.10.10.56 Lets quickly
Shellshock Vulnerability - Privilege escalation Nov 20, 2017 pentesting exploits enumeration techniques Shellshock Vulnerability - Privilege escalation In my previous post, we looked at how to exploit the shellshock vulnerability to gain a reverse shell from our vulnerable machine back to the
Creating a malicious mobile app environment - Part 2 of 2 Oct 24, 2017 social engineering mobile security msc project nfc qr codes wifi pineapple android Creating a malicious mobile app environment - Part 2 of 2 In part one we walked through the process of creating the first two phases of the mobile app environment. If you haven't already done so,
Creating a malicious mobile app environment - Part 1 of 2 Oct 13, 2017 social engineering mobile security android msc project wifi pineapple nfc qr codes Creating a malicious mobile app environment - Part 1 of 2 This article (part 1 of 2) is based around my final submission from my MSc project that I completed last year(2016). A lot has