ComTech: Using Burp Suite to Discover Domains
Introduction There are many reasons why you may want to use a brute-force method to discover web domains or sub-domains, for example reconnaissance or attack
Introduction There are many reasons why you may want to use a brute-force method to discover web domains or sub-domains, for example reconnaissance or attack
Hello everyoneAfter a short break, ComTech is back. Today’s post will talk about something that is relevant to every pentest, the do’s and the don’ts
Welcome back to Cyber Updates, apologies for hiatus over the summer. Cisco Meraki Cloud Data Loss Cisco Meraki is a cloud based network management system.
More Cryptocurrency Thefts In the previous cyber update, we mentioned the theft of a $10m worth of Ethereum during the Coinbase ICO. Since that hack
HelloFollowing my #defcon25 lecture in Las vegas, “Call the plumber – you have a leak in your (named) pipe” (https://www.defcon.org/html/defcon-25/dc-25-speakers.html#GCohen), here is the presentation file:https://drive.google.com/open?id=0B3_AmubjewYTVERidTVGZW5uRnM
Coindash loses $10m in Ethereum cryptocurrency Coindash, a company developing a Cryptocurrency tracking platform held an Initial Coin Offering this week whereby investors could pay
Hello everyone We all know how to intercept a request in a web application – simply activate your proxy, Fiddler or Burp suite and redirect
https://comsecglobprod.wpengine.com/wp-content/uploads/2017/07/cydia7.png (Note that the use of the word “rooted” below includes both jailbreaking on iOS and rooting on Android unless otherwise stated) The Mobile Security
Well it was a relatively quiet few weeks, until it wasn’t…. Here are some of the key stories that stuck out from the last few
What is it? It wasn’t long since the massive WannaCry ransomware hit the cyber-world, and starting from yesterday, Tuesday June 27th, a massive new attack of