Blog
Hacking our first MIFAR/RFID Tag
Easy tutorial about hacking our first MIFAR/RFID Tag. RFID is a technology widely used in our lives, from our building access badges, to payment facilities, or even our gates’ remotes. As we’ve seen in the previous post here, some of them are utilizing little to no...
Hacking MIFARE & RFID
Hacking MIFARE & RFID As we start this series, you won’t find anything that hasn't already been discussed before. This is not a new topic, but rather my own vision of the many different things that've been done concerning RFID. Other Proof of Concepts (PoCs) I've...
Hello 2019, Goodbye 2018!
Before we get into it... Let's start this off the right way. Thank you readers, community contributors, and supporters! We say this every year and each year it means more to us than you will know. As the Information Security community continues to grow, we would be...
5 Things You Should Know Before Hiring Professionals For Penetration Testing
Whether you’re in a small business or in a multi-million dollar company, you’d surely want to fortify and maintain your networks physical and IP security by having penetration testing. There may be a lot of pentest companies and professionals out there, but hiring...
Digital Forensics & Incident Response vs Hunt
Gone are the days of defense solely relying on systems being patched. The model of hiding behind firewalls like the Greeks in Troy. This has been proven, time and time again, to be as faulty in Cyber as it was in the days of old. There aren't many hard...
Strategies of the Cyber Hunt
Definition of Cyber Hunting by our good friends at Wikipedia: "Cyber threat hunting is "the process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions." This is in contrast to...