This is going to be a very short post. I wanted to play with some android apps and while roaming the play store came across a small app named “UnHackable” which only has a couple of hundred downloads. “Perfect” I thought, … Continue reading
Category Archives: Security
Android IRC apps storage review
I had the hypothesis that android IRC clients didn’t store credentials securely. Lets investigate… To decide what to look into I simply searched for “IRC” on the play store. The idea was to test as many as possible. I ended … Continue reading
Corporate pentest methodology
This is not going to be the usual methodology (identification, assessment, exploitation, analysis) but more how I currently get from receiving a “scope of works” to the final report. Hopefully this will be useful to someone not yet in the … Continue reading
Zenity
I don’t know about you, but I use a lot of programs and scripts that require using the command line. Mostly this is for security applications. However I have recently discovered “zenity” and wow! from wikipedia: “Zenity is free software … Continue reading
Physical security
As a computer security person mostly, the other side of security is often overlooked by me (and probably others) this is just a small document to outline some physical risks for a company and things you should be awear of … Continue reading
Cracking android lockscreens
SO as you can probably tell from the title, this will be a small tutorial on how to get the password for android devices, specifically if it has a gesture password (see image left of here) For this demonstration I … Continue reading
Malware definitions
Malware is unfortunately far too common to ignore or be unaware of in this day and age. However I am still asked every now and then about how it works and the differences between terms. So this article should hopefully remedy some … Continue reading
Social engineering reconnaissance
So I watched this talk the other day. It’s a brilliant talk, the recording is a bit quiet and I would recommend turning up the volume to watch it. If you are interested in the human aspect of security it’s a … Continue reading
CEH – Ethical hacking introduction
Since I have gone over what I belive to be the merits of self-studying security, I have decided to go over some of the materials covered when trying to get certified in security, specifically the CEH (certified ethical hacker) Currently … Continue reading
Self-study security (Part 3)
You should now have a greater understanding of security and the various fields, what you would like to pursue and learn further, what your interested in or not. You have probably got some contacts and a list of resources that … Continue reading
Securing a LAMP server (Part 2)
The first part of this series on securing a LAMP server setup focused on hardening Apache (the popular web server) this article will focus on securing both MySQL and PHP. This is a fairly straight forward process and should be … Continue reading
Securing a LAMP server (Part 1)
Weather you are just starting out and want some basic tips or you have run a server for a while there comes a point when you realise a need for security on it, by default a lot of configurations are … Continue reading
Android as a pentesting platform
So you want to use your android device as a penetration testing platform. Maybe pulling a laptop out and hacking away is too obvious and you need to be a bit more surreptitious. You might just want to impress your … Continue reading
Self-study security (Part 2)
Ok, so you’ve decided your interested in security or some aspect of it but are unsure how to get started, where to look, if it’s really the right thing for you. Like me you probably want to jump straight in … Continue reading