Thug – A Client Honeypot

Introduction to Thug & Client Honeypot Client honeypots are amazing tools for security practitioners who wish to perform a quick analysis...

Lost In Translation

A substantial security oversight is present in a variety of penetration testing tools, and it has to do with the different languages that...

PenTesting through Proxy Chaining

Unlike tools such as Nmap, Nessus, and Metasploit which are the de-facto tools used in different phases of the penetration testing...

Catch Me If You Can

One thing I really missed out this year is RSA Conference APAC 2013's closing by the all-famous Frank Abagnale. On the bright side, I...

Save the World & Get the Girl

Javvad Malik – named the “Most Entertaining Blogger” & “Best Video Blogger” at the European Blogger Awards 2013 – presented “How...

Who's Really Attacking Your ICS?

Attackers are actively targeting Internet-connected industrial control systems (ICS) according to data collected from a global network of...

What Facebook Knows About You?

These are the data/information you provide to Facebook: Name City of birth City of residence Phone Email Current employment Previous...

3 Wireless Security Myths

Quick Tips Network name hiding and MAC address filtering are for safety, not for security. Never use WEP as your wireless encryption...

Understanding & Reading Packets

Reading packets can be invaluable to security professionals. Especially when trying to understand how NIDS/NIPS or other packet filtering...

Hacking Made Too Easy

A couple of months back, I walked past a friend who was working furiously on her laptop. It was her red BackTrack wallpaper that caught...

Safe PenTesting with Metasploit

For anyone who's experienced with Metasploit will know that there's a risk of crashing the target system. That's because systems...