Month: October 2012
Technical | Adversary Simulation
Exploiting Trusted Hosts in WinRM
Technical | Network Pentesting
Testing Applications for DLL Preloading Vulnerabilities
Technical | Mobile Application Pentesting
Android Exploitation Technical Paper Release
Technical | Web Application Pentesting
Thoughts on Web Application Firewalls
Technical | Network Pentesting
UPEK + Lenovo = Insecure Password Storage
Technical | Thick Application Pentesting
Pentesting Java Thick Applications with Burp JDSer
Technical | Vulnerability Management