Finding the Leaks
One of the common vulnerabilities we find when performing internal network penetration testing is sensitive data on open SMB file shares. Now, by...
One of the common vulnerabilities we find when performing internal network penetration testing is sensitive data on open SMB file shares. Now, by...
This post is part of our Professionally Evil series of posts that discuss some of the experiences we have had as Security Consultants. In Kevin’s...
As we finish 2012 and look forward to 2013, Secure Ideas’ staff would like to wish everyone a happy new year. We also thought it would be fun to do...
Here at Secure Ideas we have had a ton of fun experiences during our work. When we teach or present, people often ask us to talk about the things we...
A few months ago I did the original Installing RatProxy on Windows blog post that describes both how to install Cygwin (required for RatProxy) and...
A common question I get from potential clients is “what is grey box testing and why do we need it?” I believe this often stems from the request for...
The new features in HTML5 have opened a whole new world of opportunities for developers and for attackers. Secure Ideas recognized this and with...
As a security consultant, frequently traveling, it is critical to implement security controls to protect sensitive data on my computer. One of the...
I recently attended, and spoke, at the Louisville Metro Infosec Conference (http://louisvilleinfosec.com/) in Kentucky. The organizers did an...
Its a wrap! DerbyCon has ended for the Secure Ideas crew and we are all headed home. While a few team members are flying out, the rest of us are...
So the Secure Ideas staff is pretty excited to be headed to DerbyCon even though Jason is the only one smart enough to fly there. (James, Kevin, Tony...
As penetration testers, there are many different technologies that we have to be familiar with. The more we know and understand about a given...