Vulnerability scanning – Defining a scanning approach
In my working life I have had various roles as security consultant. One of these roles was working in an
Read moreIn my working life I have had various roles as security consultant. One of these roles was working in an
Read moreFor automated log monitoring and alerting, several years ago I decided to start using OSSEC. The nice thing about OSSEC
Read moreRecently I decided to stop breaking stuff on my web server, dns server and other internal infrastructure. It simply takes
Read moreHalfway past November, a vulnerability in the LUKS Full-disk encryption for linux systems was discovered (CVE-2016-4484). Since I use this
Read moreLast month I started working on something that feels extremely counter-intuitive. Building targets for a hacking ‘Capture The Flag‘ event.
Read moreVulnerabilities can be found in all types of software such as end-user applications, middle-ware. Vulnerabilities are also found in operating
Read moreWhen working with scanning tools, you must first determine what type of scanner you are working with. There are several
Read moreIn my working life I have had various roles as security consultant. One of these roles was working in an
Read moreVulnerability management (processes) and therefore vulnerability scanning (techniques) are a requirement for any organization that takes security serious. In my
Read moreAs part of my pursuit for more knowledge in the information security field, I visited the InfoSecurity.nl Conference in Utrecht,
Read more