When two-factor isn’t enough.

There has been a massive push to encourage users to enable two-factor authentication on their accounts. From in-game rewards to membership discounts two-factor has been strongly encouraged by a number of companies to provide greater security to users, but could this lull users into a false sense of security? As two-factor usage has grown more…

Getting Started with Splunk

Splunk Blog Post Header Image

With the growth of technology into every aspect of our lives, the amount of data being reported back has grown with it. The sheer volume of data means that manually sifting through the data is impossible within a reasonable time frame. Splunk is software whose aim is to sort through this data and highlight any interesting…

The Endorser by eth0izzle

Example of The Endorser Output

A common trope is that there are only six degrees of separation between all people on the planet. While this may or may not be true; the endorser by eth0izzle is an Open-Source intelligence tool that can help you use the connections between people to find ever more promising potential targets. The endorser uses LinkedIn…

Phishing Catcher by x0rz

Recently I was shown a tool by a friend that I can honestly say left me in awe of its simplicity, yet how powerful it could be. Working in technical support for sometime means I have lost count of the number of people I have come across who have fallen for phishing scams. One method…

Initial Steps with Nmap

Browsing through the many tools a good pen tester needs, nearly all other tools refer to Nmap. This isn’t surprising as at its core; Nmap is primarily about finding intelligence on a target, such as what services and ports are running and how aggressive the firewall protecting it, if any, may be. While on the…