Getting started with Terraform.io Feb 28, 2018 Infrastructure as Code Terraform AWS Kali in the Cloud Getting started with Terraform.io I seem to be failing to blog as much as I would have hoped, I have several articles in draft format that I just haven't
The inherent assumption of security Feb 20, 2018 information security social engineering The inherent assumption of security This post is more of an observation than some of my other posts, its based around a theory that I have, which I call "the
Hack the Box - Shocker Walkthrough Jan 17, 2018 pentesting htb walkthrough Hack the Box - Shocker Walkthrough Walkthrough of Shocker (10.10.10.56) on Hack the box. nmap: nmap -v -p- -sC -sV -oA shocker 10.10.10.56 Lets quickly
Shellshock Vulnerability - Privilege escalation Nov 20, 2017 pentesting exploits enumeration techniques Shellshock Vulnerability - Privilege escalation In my previous post, we looked at how to exploit the shellshock vulnerability to gain a reverse shell from our vulnerable machine back to the
Creating a malicious mobile app environment - Part 2 of 2 Oct 24, 2017 social engineering mobile security msc project nfc qr codes wifi pineapple android Creating a malicious mobile app environment - Part 2 of 2 In part one we walked through the process of creating the first two phases of the mobile app environment. If you haven't already done so,