Are Cyber Attacks an Act of War?

A Huawei Phone Mast

As the New Year started the most prominent story was that of the Meltdown and Spectre vulnerabilities. The vulnerabilities are certainly huge as they may only be completely resolved by replacing the processor of a device. A story that wasn’t given as much prominence but is a huge development is the cancellation of a deal…

Diving into Wireshark

Wireshark Header Image

Public wifi networks are now so prevalent that they have become relied upon by people for a high percentage of their data usage. With the amount of data now consumed on peoples mobiles and the sometimes stingy data packages offered by carriers; public wifi is sometimes used as a the main internet connection on a…

The Endorser by eth0izzle

Example of The Endorser Output

A common trope is that there are only six degrees of separation between all people on the planet. While this may or may not be true; the endorser by eth0izzle is an Open-Source intelligence tool that can help you use the connections between people to find ever more promising potential targets. The endorser uses LinkedIn…

Uber’s Big Data Breach

Uber's Logo

This week Uber revealed it was subject to a data breach affecting around fifty-seven million of its users and drivers, with nearly three million of the users affected residing in the UK. Unfortunately a large corporation being subject to a breach no longer has the shock it once did, but Uber’s case is slightly different…

Phishing Catcher by x0rz

Recently I was shown a tool by a friend that I can honestly say left me in awe of its simplicity, yet how powerful it could be. Working in technical support for sometime means I have lost count of the number of people I have come across who have fallen for phishing scams. One method…

Initial Steps with Nmap

Browsing through the many tools a good pen tester needs, nearly all other tools refer to Nmap. This isn’t surprising as at its core; Nmap is primarily about finding intelligence on a target, such as what services and ports are running and how aggressive the firewall protecting it, if any, may be. While on the…