What Can We Help You Find?

Image
gen_blog_list_item

April 23, 2012

During service discovery, I occasionally run into hosts that will report every single port as open. Obviously this is because something in front or on....

Blog

Image
gen_blog_list_item

April 18, 2012

While performing security assessments for clients, I occasionally encounter circumstances where I'd like a little more flexibility while using....

Blog

Image
gen_blog_list_item

April 16, 2012

Whether the need for a Security Information and Event Management (SIEM) is based on requirements for centralized repository and reporting or....

Blog

Image
gen_blog_list_item

February 05, 2012

As pen-testers, it is often that we come across obstacles; the technical adversaries that keep us from getting our prize in the cracker jack box. This....

Blog

Image
dataflow_list_item

December 15, 2011

This post is designed to give a high level overview of what should be included in a network diagram and how to incorporate simple data flow indicators....

Blog