Tiny Honeypot (THP)
Tiny Honeypot (THP) is probably the easiest low-interaction honeypot I’ve deployed, and it produced a reasonable amount of results from...
Tiny Honeypot (THP) is probably the easiest low-interaction honeypot I’ve deployed, and it produced a reasonable amount of results from...
Many Internet users know that devices/machines on networks are identified using IP addresses. But if you're familiar with the ISO/IEC...
1. Introduction to Netcat Netcat is a network service for reading and writing network connections using either TCP or UDP. It has the...
John the Ripper (JTR) is an extraordinary tool that is useful for cracking passwords. First, we must understand that using a word list is...
GovWare 2011 – Enterprise Security Track I had the privilege to be in one of the sessions conducted by SecureAge in the Enterprise...
How much do you know about Common Criteria (CC)? It is a deep-tech domain not widely taught nor explored in many courses of study in...
Sometimes I use Tor when I am hooked up to a Wi-Fi connection or a network which I am not familiar with. Simply because relying only on...
A Minnesota hacker prosecutors described as a “depraved criminal” was handed an 18-year prison term for unleashing a vendetta of...
I thought why not shed some light on the tools that I have been using to play with the Wi-Fi networks around me. Hopefully, we can get...
Ever wondered how your devices like your laptop get the list of wireless networks available? First, you have to understand that at any...
One of the common misconceptions that people tend to have is that higher gain is better. This results in people blindly buying the...
Wi-Fi (Wireless Fidelity) came about in 1999 and has gained popularity to over 700 million people and over 750,000 hotspots all around...
In cryptography, it is a bad practice to use the same encryption key to encrypt every single packets/data. If Eve the eavesdropper has a...
Just because you are an ordinary employee in a company does not make you "invaluable". Whatever information you have on your company that...
Just mention APT in your presentation/product, people will come and listen to you. A passing remarked I received from my friend when I...
I’ve been pondering about this, perhaps some people can shed some light. When social engineers succeed in their engagements, it usually...