Silencing Firefox’s Chattiness for Web App Testing

Firefox is one chatty browser! Even if you don’t actually use it for anything, it’s constantly making requests out to the internet for things like updates, checking network status, and sending telemetry data back to Mozilla. When using Firefox for web app testing, I’ve often noticed the constant stream of additional requests that get in …

Silencing Firefox’s Chattiness for Web App TestingRead More »

Not Just Another Notch in Your Belt: Organizational Challenges of PCI Compliance

As an account manager in the world of security, I am constantly confronted with questions surrounding PCI compliance and the challenges organizations face with ensuring proper controls are in place, and all requirements met.  If we get down to the core of the issue, the reality is many organizations either don’t have the budget or …

Not Just Another Notch in Your Belt: Organizational Challenges of PCI ComplianceRead More »

Gosh Darn Policy Requirements

The Internet was built to be a platform to share information remotely.  Since it was created, sharing everything about ourselves and others has become second-nature for many individuals traversing the Internet.  We’ve been given several platforms, sites, forums, social media, any way we want to speak our mind; We have the ability to share our …

Gosh Darn Policy RequirementsRead More »

Introduction to Wireless Security with Aircrack-ng

Introduction to Wireless Security with Aircrack-ng   Today we’re going to walk through a few WiFi testing examples using Aircrack-ng, which is a suite of wireless network security tools.  It allows us to monitor and export packet data, attack access points and clients, and crack WEP and WPA keys.  I’ve included some links at the …

Introduction to Wireless Security with Aircrack-ngRead More »

Automating Red Team Homelabs: Part 1 – Kali Automation

Homelab infrastructure got you down? Well, not anymore! This is the first post of a 3-part series that will talk about how to automate your home lab, from your kali box to all your vulnerable and domain-joined test vms. It will teach you how to keep your infrastructure dynamic, idempotent, and resilient (a necessity for …

Automating Red Team Homelabs: Part 1 – Kali AutomationRead More »

Security on the Go!

The use of mobile devices is steadily growing.  With this increase comes the need for the users to learn how to safely operate their devices.  Just like with computers, mobile devices can come under attack as well. Let’s go through a few basics of mobile device security and what people should be on the lookout …

Security on the Go!Read More »

Escaping the Whale: Things You Probably Shouldn’t Do With Docker (part 2)

This post is part 2 of a series of blog posts on container hacking. If you haven’t read the part1, you should check it out. Today I’m going to tell you about a new collection of scripts, and a lab VM for hacking containers. Both of these resources are currently works in progress, and are …

Escaping the Whale: Things You Probably Shouldn’t Do With Docker (part 2)Read More »

Scroll to Top