Open PenTest – Collection of Useful Bookmarks
The guys over at Security Aegis have started to put together a huge compendium of links and bookmarks for penetration testers. These links are to noteworthy, and of course useful, pages that reference...
View ArticleIE6, your death slowly awaits…
Microsoft has recently announced that it is urging users to stop using Internet Explorer 6, the now 10 year old browser. They have even come out with a website dedicated to show the current world usage...
View ArticleMap of the Internet – 2011
Today, I stumbled across a blog from an Atlanta based hosting company, PEER 1, and saw a really interesting post about a graphical view of the Internet. They have created an interactive image, showing...
View ArticleEpsilon Breach and You
Recently, a third party company, Epsilon, an email marketing company, was breached and a large number of email addresses and names were compromised. A large number of Fortune 500 companies and large...
View Articled0z.me – Malicious URL Shortener & HTML5 DDoS PoC
My buddy, Ben Schmidt (@_supernothing on Twitter), over at Spare Clock Cycles has blessed the world with d0z.me, a DDoS proof of concept tool written in HTML5. Taken from spareclockcycles.org - “d0z.me...
View ArticleSecurity Magazines
In my ongoing effort to learn more and stay informed about everything in the security industry, I have come across a few security focused magazines to assist me with that ideal. Over the past few...
View ArticleHow to Get Rid of MacDefender
So, you somehow got the new Mac malware, MacDefender. Apple has updated a support article** showing how to avoid installing, removing, and protecting against getting this lovely bit of malware. How to...
View ArticleJohn The Ripper, Now Sponsored by Rapid7
I have copied and given credit to the following article regarding John The Ripper, the well known password cracker, from darkreading.com. I feel I am unable to reproduce the article without blatantly...
View ArticlePython script to parse nMap XML
I created this script to assist with parsing large nMap XML files during my penetration testing engagements where I utilize an appliance that only has SSH access, and therefore, no GUI. After a few...
View ArticleWhat is the Microsoft IIS Tilde Directory Enumeration Vulnerability?
Over the past couple of months of pen testing, I have come across something new to me at least, the Microsoft IIS Tilde Directory Enumeration vulnerability, that is rather prevalent among IIS...
View Article
More Pages to Explore .....