Confessions of a Penetration Tester

This blog is mostly for my own archiving of vulnerabilities I have discovered and defensive techniques. Hopefully it will serve others as well.









2016-12-02

Pen testing Collaboration with FuseSoft Faction

›
If you have not checked out FuseSoft Faction and you're on a web and mobile/ application security penetration testing team then you mig...
2012-04-08

Mallory MiTM Proxy as a Wireless Access Point (Part 2 of 2)

›
In Part 1 we got an Virtual Machine partially running as a wireless access point using Virtual Box, Ubuntu, hostapd, and an Alfa wifi card. ...
1 comment:
2012-04-07

Mallory MiTM Proxy as a Wireless Access Point (Part 1 of 2)

›
Mallory MiTM Proxy  is great tool if you need to intercept and modify non HTTP connections. I generally use this tool while doing mobile ass...
3 comments:
2011-09-13

DB2 SQL Injection : Select the Nth row without cursors

›
Well I've looked all over the net for this solution and I could not find the answer so after much trial an error I was able to build my ...
2011-04-28

Hacking 101 with Tracer-T

›
This makes me laugh every time I watch it. I still cannot figure out if the kid is joking or serious.
7 comments:
2011-03-27

Roku hidden features.

›
I finally bought a Roku device today and immediately went looking for development resources. I was surprised to find they have and SDK yo...
2011-03-25

Hack Like in the Movies… with RADAR

›
I have just started a new (possibly open source) project/experiment to perform 3D modeling of network traffic and networking events in near ...
7 comments:
›
Home
View web version
Powered by Blogger.