Blog

Hacking our first MIFAR/RFID Tag

Hacking our first MIFAR/RFID Tag

Easy tutorial about hacking our first MIFAR/RFID Tag. RFID is a technology widely used in our lives, from our building access badges, to payment facilities, or even our gates’ remotes. As we’ve seen in the previous post here, some of them are utilizing little to no...

Hacking MIFARE & RFID

Hacking MIFARE & RFID

Hacking MIFARE & RFID As we start this series, you won’t find anything that hasn't already been discussed before. This is not a new topic, but rather my own vision of the many different things that've been done concerning RFID. Other Proof of Concepts (PoCs) I've...

Hello 2019, Goodbye 2018!

Hello 2019, Goodbye 2018!

Before we get into it... Let's start this off the right way.  Thank you readers, community contributors, and supporters! We say this every year and each year it means more to us than you will know.  As the Information Security community continues to grow, we would be...

Digital Forensics & Incident Response vs Hunt

Digital Forensics & Incident Response vs Hunt

Gone are the days of defense solely relying on systems being patched. The model of hiding behind firewalls like the Greeks in Troy.  This has been proven, time and time again, to be as faulty in Cyber as it was in the days of old. There aren't many hard...

Strategies of the Cyber Hunt

Strategies of the Cyber Hunt

Definition of Cyber Hunting by our good friends at Wikipedia: "Cyber threat hunting is "the process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions." This is in contrast to...

You were not leaving your cart just like that, right?

Enter your details below to save your shopping cart for later. And, who knows, maybe we will even send you a sweet discount code :)