British security firm Pen Test Partners tells us a creepy cybersecurity story set in a place difficult to associate with computers: the engine room of a ship.
Continue reading “PenTest Chronicles: a mistery box on a ship”
During a penetration test, once you get a local access to a target, you should start a local assessment of the machine in order to plan a correct tactic for privileges escalation and lateral movement.
Continue reading “Windows information gathering using Powershell: a brief cheatsheet”
An interesting article by Luca Bongiorni explains how to create a remote controlled HID injector cable using some simple hardware components easily purchased on online stores (with less then 10$)
Continue reading “USBSamurai: how to make a remote controlled USB HID injecting cable for less than 10$”
After a post focused on Android, another list of tools useful for penetration testing and reverse engineering of iOS applications.
Continue reading “Reverse engineering and penetration testing on iOS apps: my own list of tools”
Also all this tools are OSS and freely available.
This list of tools is really useful both in penetration testing on an Android application and in reverse engineering of a suspicious application.
Continue reading “Reverse engineering and penetration testing on Android apps: my own list of tools”
All tools are OSS and freely available: so, enjoy!