The threat of smart home devices is growing. It’s almost 2022 and the market for IOT or smart devices is exploding. In fact, one estimate predicts there will be 21 billion IOT devices by the end of 2021! This innovation explosion means it is now possible to purchase a kettle that we can switch on … Read more
Wireless networks are generally a weaker alternative to a hardwire connections. Why is this? Well, if the wireless network’s traffic is open, then anyone within range can gain access which means it’s vulnerable to a ‘sniffing attack’. Modern wireless networks get around this by using encryption that requires a secret key. How are wireless networks … Read more
If the name doesn’t already sound strange enough, wait until you see what you can do with Google Dorking. Before we dive deep into how we can use Google Dorking. We must first look at search engines themselves. What is a search engine? A search engine can be thought of as a behemothic database, however, … Read more
OSINT or Open-source Intelligence is a process of data collection using sources that are open to the public. This can be a wide range of origins – anything from large blogs to specific images and the metadata contained within. Everything posted online discloses some information about the poster and this is what OSINT is looking … Read more
Web application penetration testing describes the process of simulating an unobtrusive attack against a web application. It allows companies to understand vulnerabilities that are easy to miss during the development process. These vulnerabilities can have wide-reaching consequences to the application as well as the data stored within its database.
Let us look into how to become a Penetration Tester or ‘Pentester’. The more penetration testers the better. With the world of ‘hacking’ ahead of you, it can be hard to know where to start. This blog post hopes to point you in the right direction and give you a guide to the mindset needed to become good at penetration testing.
Corporate hacking surges are becoming more frequent. Work-from-home policies have contributed to a large surge in hacking against corporations. Many staff have made the transition to working from their homes amidst the global covid-19 pandemic. As a result we are seeing malicious activity more than double in many countries.