pentest

Free Webcast April 10th: Learn about APTs, Business Process Hacking and Breaking into a Casino!

On Tuesday April 10th at 12pm EST, 9am PST, 5pm GMT I’ll be presenting “5 Lessons Learned From Breaking In: Confessions of a Pentester & Other Stories” during a free webinar.  I’ll be talking about the five most common ways my team and I break into companies that you would think are highly secured such […]

Free Webcast April 10th: Learn about APTs, Business Process Hacking and Breaking into a Casino! Read More »

Attacking & Defending Apple iOS Devices in the Enterprise Presentation Updates

Below are links over on SlideShare to the latest version of my ever evolving presentation “Attacking & Defending Apple iOS Devices in the Enterprise”.  This is the version I presented at the SANS Mobile Device Security Summit a few weeks ago.  I include information on iOS 5, the latest jailbreaks at the time (this has

Attacking & Defending Apple iOS Devices in the Enterprise Presentation Updates Read More »

Don’t Drop the SOAP: Real World Web Service Testing for Web Hackers Presentation

Sorry for the long delay on posting the slides from the presentation that myself, Josh Abraham and Kevin Johnson did at Black Hat USA and DEF CON 19.  I’ve uploaded the slides from DEF CON to SlideShare (you can also download a copy there as well) and below are the links to the tools and

Don’t Drop the SOAP: Real World Web Service Testing for Web Hackers Presentation Read More »

Enterprise Open Source Intelligence Gathering – Part 3 Monitoring and Social Media Policies

This is the final article in my series on Enterprise Open Source Intelligence Gathering.  This information relates to the main topics from my presentation that I am giving this week at the 7th Annual Ohio Information Security Summit.  For more background information, see part one.  If you missed part two (blogs, message boards and metadata)

Enterprise Open Source Intelligence Gathering – Part 3 Monitoring and Social Media Policies Read More »

Enterprise Open Source Intelligence Gathering – Part 2 Blogs, Message Boards and Metadata

This post is part two of my three part series on Enterprise Open Source Intelligence Gathering.  This information relates to the presentation that I am giving this week at the 7th Annual Ohio Information Security Summit.  For more background information, see part 1.  Part three will be about putting together a simple monitoring program/toolkit and

Enterprise Open Source Intelligence Gathering – Part 2 Blogs, Message Boards and Metadata Read More »