So this is just going to be another short blog post. I was lying in bed playing one of my favourite games “SFCave”. I love it and have been playing for years. However there are some levels that I have … Continue reading
Author Archives: Ross Marks
Android App – “SFCave”
Android App – “UnHackable”
This is going to be a very short post. I wanted to play with some android apps and while roaming the play store came across a small app named “UnHackable” which only has a couple of hundred downloads. “Perfect” I thought, … Continue reading
Android IRC apps storage review
I had the hypothesis that android IRC clients didn’t store credentials securely. Lets investigate… To decide what to look into I simply searched for “IRC” on the play store. The idea was to test as many as possible. I ended … Continue reading
Corporate pentest methodology
This is not going to be the usual methodology (identification, assessment, exploitation, analysis) but more how I currently get from receiving a “scope of works” to the final report. Hopefully this will be useful to someone not yet in the … Continue reading
What I’ve learnt working from home
So recently I landed my dream job, recently being about 2 months ago. “What is this job I hear you ask?” well I’m still a security consultant / penetration tester, but this is a work from home job. Very little … Continue reading
Zenity
I don’t know about you, but I use a lot of programs and scripts that require using the command line. Mostly this is for security applications. However I have recently discovered “zenity” and wow! from wikipedia: “Zenity is free software … Continue reading
Simple budget spreadsheet
I have recently taken a job, so sorry the “services” are no longer available and I will update that page ASAP. Of course I will continue to blog and am still hopeful to break into the security industry. However – … Continue reading
Physical security
As a computer security person mostly, the other side of security is often overlooked by me (and probably others) this is just a small document to outline some physical risks for a company and things you should be awear of … Continue reading
Heatmaps – Click tracking tutorial
As you can tell by the title, this tutorial is going to be how to implement click tracking and display them on an overlay to your website. I recently launched a new website (CheckAttacks.com) and wanted to implement this to … Continue reading
Personal portable website development
I guess firstly. Whats this about? well I like to take my current projects everywhere I can with me. I like to work where ever I can, if an idea comes to me, I want to be able to implement … Continue reading
My debian laptop setup
I have been asked to give a tour / demonstration on how I have set up my laptop. I use it for everyday use... web devolpment, social networking, security... it's not powerful enough for gaming but will do pretty much … Continue reading
Cracking android lockscreens
SO as you can probably tell from the title, this will be a small tutorial on how to get the password for android devices, specifically if it has a gesture password (see image left of here) For this demonstration I … Continue reading
Malware definitions
Malware is unfortunately far too common to ignore or be unaware of in this day and age. However I am still asked every now and then about how it works and the differences between terms. So this article should hopefully remedy some … Continue reading
Social engineering reconnaissance
So I watched this talk the other day. It’s a brilliant talk, the recording is a bit quiet and I would recommend turning up the volume to watch it. If you are interested in the human aspect of security it’s a … Continue reading