Creating a malicious mobile app environment - Part 1 of 2 Oct 13, 2017 social engineering mobile security android msc project wifi pineapple nfc qr codes Creating a malicious mobile app environment - Part 1 of 2 This article (part 1 of 2) is based around my final submission from my MSc project that I completed last year(2016). A lot has
Shellshock Vulnerability Sep 28, 2017 pentesting vulnerabilities exploits Shellshock Vulnerability Given that my first pentesting experience resulted in a discovery of the shellshock vulnerability, I thought I would write an explanation detailing the vulnerability. What
Pentesting Experience Jul 13, 2017 information security oscp pentesting Pentesting Experience In this post, I'm going to give you an overview of how I approached the process of doing a live penetration test for a client.
Book Review: ltr101 - Breaking into Information Security May 22, 2017 book-review resources Book Review: ltr101 - Breaking into Information Security Being a relative newb to the world of information security, I thought I would do a quick review of Andy Gill's book Breaking into Information
Shadow IT - Are employee's guilty of putting businesses at risk ? May 2, 2017 information security Shadow IT - Are employee's guilty of putting businesses at risk ? In late August 2016, a huge cache of personal data from the cloud based file sharing and storage website Dropbox was leaked online. The data