How to Build Your Own Penetration Testing Drop Box
Beau Bullock // TL;DR I compared three single-board computers (SBC) against each other with a specific goal of finding which one would serve best as a “penetration testing dropbox”, and […]
Beau Bullock // TL;DR I compared three single-board computers (SBC) against each other with a specific goal of finding which one would serve best as a “penetration testing dropbox”, and […]
Ethan Robish // Ads serve an important function on the internet. For many websites, ads are the main form of revenue that funds the site’s content or service. This, however, […]
Lawrence Hoffman // So, LastPass is one of my favorite applications, and it’s making me more nervous every day. I haven’t lost faith yet, though it was lots more convenient […]
CJ Cox // Joining a new organization is always a little intimidating, being amongst a group of crack hackers in a top-notch small company only squares the stress. On the […]
Sierra Ward // The other day I went to get some food with a co-worker. When the counter boy asked for my name I told him. The co-worker said she could […]
Lawrence Hoffman // The list this week is a little shorter, I didn’t include a tool or POC link as I usually do. No particular reason, just didn’t run across […]
A Guest blog by Matthew Pawelski // A C2, or command-and-control, is used by attackers to control compromised systems. Most of these C2s are in control of large botnets, yet […]
Sam Carroll // When I started at BHIS I was surprised at the sensitivity of personal data, such as my birthday. I was soon reminded of a data mining class […]
Lawrence Hoffman // Hey, I’m back! Vacation was great. I spent part of last week on an Island so I was unable to scratch the keep-up-with-the-media itch. Now that I’m […]