Subscribers and regular visitors to the blog will know I am a fan of hypnosis, and like most things I am passionate for I am always on the look out to discover new ways of doing things, gaining perspective of others and generally a healthy thirst for knowledge. You will of noticed I have purchased […]
Back in October 2012 I attended a Pickpocket Training Day with Professional Opportunist James Brown, and I blogged about it on this site here. It was a great session and many people have asked me about it, but not everyone has the time to travel, or may have logistical and financial constraints based on geographical […]
Depending on your history and how you got into InfoSec you may or may not of been exposed to the world of developer testing, if you did I am sure you have many unhappy memories of arguing why “real” data should not be used in the testing world, and if like me you have horror […]
I just received an email from Proofpoint, and its another one of their great Infographs. This is a great Infograph re-enforcing the fact that it only takes a single breach for the cost to be significant. Not surprisingly the information shows that 91% of All Attacks have some form of phishing attribution, and 95% of […]
So its a cold Monday morning in November 2013 and the phone rings, who could this be? Sadly its not someone calling me to tell me there are millions of pounds to be had if I can just send some money over, instead it turns out I have computer issues, but the friendly certified Microsoft […]
Hope everyone is off to a good week, what with Defcon, Blackhat etc I am sure many of you are travelling. I personally had a weekend break in Cardiff and enjoyed doing a little grey matter manipulation, as well as talking about...
So I cant quite remember when it was, but I think it was the late part of 2010 that I stumbled across the work of this guy who goes by the name of James Brown. No not the musical one (although he may be a great singer), the one...
In the wonderful world of InfoSec we often talk about zombies, and the associated botnet zombie army. With our army of machines we can do our evil bidding, and wreak havoc upon the unexpected users of the Interwebs. So what has...
* I started this post in Feb 2014 but it took me a while to actually finish it š Aside from mentioning Maltego in my recommended OSINT Tools List, I have never gone into any detail about this awesome tool from Paterva. The m...
Wireless recon and exploitation may not be one of the techniques that first jumps to mind when you think of Social Engineering, but its a valid attack vector for both the on premises recon and attacks (direct to the wireless in...