Finding the Leaks

One of the common vulnerabilities we find when performing internal network penetration testing is sensitive data on open SMB file shares.  Now, by “open” I am including both unauthenticated as well as file shares that allow any authenticated user.  It certainly makes sense for organizations to have file shares that are accessible to all employees …

Finding the Leaks Read More »

Happy New Years!

As we finish 2012 and look forward to 2013, Secure Ideas’ staff would like to wish everyone a happy new year.  We also thought it would be fun to do a quick review of the year, with each of our staff including their thoughts.  So here goes…. What a great second year for Secure Ideas! …

Happy New Years! Read More »

Gone Phishing

Many organizations do not include phishing in their annual penetration tests, as they believe that most phishing emails will be stopped by their email filtering solutions.  Any “phishy” emails that get through will likely be clicked on by their employees but stopped by anti-virus or web filtering controls.  These controls are good, but they typically …

Gone Phishing Read More »

Grey Box Penetration Testing

A common question I get from potential clients is “what is grey box testing and why do we need it?”  I believe this often stems from the request for credentials to an application when discussing the penetration test.  The thought is that if we are testing the system like an attacker,   providing credentials is breaking …

Grey Box Penetration Testing Read More »

How To: Encrypting Mac Mail

As a security consultant, frequently traveling, it is critical to implement security controls to protect sensitive data on my computer.  One of the most often overlooked data is locally stored email.  A quick search on the web identified some good ways to encrypt the Mac Mail store.  A great resource that I found was an …

How To: Encrypting Mac Mail Read More »

Installing RatProxy on Windows – Video Uploaded

A few months ago I did the original Installing RatProxy on Windows blog post that describes both how to install Cygwin (required for RatProxy) and RatProxy.  The previous post does a great job of walking through the process of the installation, but I wanted to do a video for those that prefer the visual aide …

Installing RatProxy on Windows – Video Uploaded Read More »

Ninja Developer Talk at Louisville Metro Infosec Conference

I recently attended, and spoke, at the Louisville Metro Infosec Conference (http://louisvilleinfosec.com/) in Kentucky.  The organizers did an excellent job putting this event together and I really enjoyed my time there.   My presentation was titled “Ninja Developers” and was focused on tools that developers can use to help them test for security vulnerabilities in their …

Ninja Developer Talk at Louisville Metro Infosec Conference Read More »

Scroll to Top