what kind of attacks can come?

  attacks will come in all types and methods, some will be standard – and some turbo charged. The reason a new vulnerability is such a big deal, is that any little problem vulnerability can cause a hacker to get a small connection with your systems. And unfortunately any small connection can led to larger … Read more

more pentesting tools in the toolkit

Hydra, w3af, Scapy    are all good as well. We can create our own scans using scapy – as we can create our own scan reviews depending on the environment that we need to look at. to make this work – one really needs to understand the tcp networking  from rfc793 contact us to learn … Read more

Pentesting – what is it actually?

Penetration testing are several acts on various computers and systems.   First in “recon”  one checks the public profile of the company. Use scan tools, nmap, hping, scapy, burp suite,  and others to check the target computers out.  (this is the Alpha scan)   Then one can use a few pre-built tools to review vulnerabilities … Read more

Check your own ports on the Internet

There are some good tools on the Internet (free) Like this one:  http://www.yougetsignal.com/tools/open-ports/ This is just a basic port scan (likely tcp open check) unfortunately a hacker will use multiple scans and some of the different flags a packet can have.   There are 2^8 ports and 6 different flags for packets (SYN/ACK/RST/FIN/URG/PSH) A good … Read more

Heartbleed – on the mend

Internet Storm Center says Heartbleed around the net is slowly being patched. How do they know that?  Well, in case you are not a programmatic person… One can easily scan the Internet to find out what is going on, and that is exactly what the bad guys are doing all the time. They know when … Read more