Welcome to the 6th day of the C# Advent! Let's encrypt some malware.
That sounds horrible, but in se...
Read More
Reconnaissance means something different for pentesters as it does from vulnerability analysts. ...
Read More
Being a vulnerability analyst has a few humorous artifacts. This takes a few different forms, but in...
Read More
All of this fancy organization and lists are just tools for the goal - making a list of everything t...
Read More
The vulnerabilities you hear about aren’t really the problem much of the time.
I don’t w...
Read More
We live in a world where applications run the technology that we all use. There was, once, a t...
Read More
Bryant Maddrik at ABC6 interviewed me and Todd Whittaker at Franklin about the plight of the good gu...
Read More
Monday this week, I was at lunch with the family and Adam (my son) kept bumping Gabrielle (my wife)...
Read More
Skipfich is another web mapping vulnerability scanner, along the lines of my preferred Nikto. ...
Read More
As I mentioned in my intro post, I have started with the vulnerability-analysis modules and just wen...
Read More
It's true, ftp isn't something that you think of first when conducting an assessment We look at web...
Read More
Some of you know that I am the curator of the Information Security desk at Wikistrat, a virtual stra...
Read More