Wireshark

 What is Wireshark? Wireshark is a network packet analyzer. A network packet analyzer will try to capture network packets and tries to display that packet data as detailed as possible. You could think of a network packet analyzer as a

Read more

Defcon 2017

eaphammer by Gabriel Ryan (s0lst1c3) Overview EAPHammer is a toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks. It is designed to be used in full scope wireless assessments and red team engagements. As such, focus is placed on

Read more

Secure SDLC

  The Secure SDLC is a framework for introducing various aspects of application security – secure coding, security testing, remediation of vulnerabilities, etc. – throughout an organization’s existing SDLC. The idea is to better build security into the application by

Read more

Threat Modeling

Threat modeling is the process that improves software and network security by identifying and rating the potential threats and vulnerabilities your software may face, so that you can fix security issues before it’s too late. The process is then followed

Read more

Cloudbleed

Cloudbleed (also known as CloudLeak and CloudFlare Bug) is a security bug discovered on February 17, 2017 affecting Cloudflare‘s reverse proxies,[1] which caused their edge servers to run past the end of a buffer and return memory that contained private

Read more

Pin It on Pinterest