what kind of attacks can come?
attacks will come in all types and methods, some will be standard – and some turbo charged. The reason a new vulnerability is such a big deal, is that any…
more pentesting tools in the toolkit
Hydra, w3af, Scapy are all good as well. We can create our own scans using scapy – as we can create our own scan reviews depending on the environment that…
Pentesting – what is it actually?
Penetration testing are several acts on various computers and systems. First in “recon” one checks the public profile of the company. Use scan tools, nmap, hping, scapy, burp suite, and…
Check your own ports on the Internet
There are some good tools on the Internet (free) Like this one: http://www.yougetsignal.com/tools/open-ports/ This is just a basic port scan (likely tcp open check) unfortunately a hacker will use multiple…
Heartbleed – on the mend
Internet Storm Center says Heartbleed around the net is slowly being patched. How do they know that? Well, in case you are not a programmatic person… One can easily scan…
