Why the pwnpad?

As I was reading through the blogs over at pwnieexpress, while I waited for my nexus 7 to arrive, I saw their write up on why the pwnpad? and thought it was a good opportunity to chime in. I can answer this questions in three simple words: Discrete, Easy, and Sexy (reminds me of the […]

Android app locks

So the other day I did a quick review of Pentest tools android application and that made me think of another app (more like concepts) that I like – App lockers. As there are several to choose from I didn’t want to review/endorse any one, instead I wanted to quickly talk about why I like […]

Pen-test tools

While playing around with my newly built pwnpad, I started looking at various android tools to augment the pwnpad tool set. Frustrated with all the crappy tools that were labeled “security” or “hacking” I about gave up on my search until I found Pen-test tools. Now before you go out thinking I pointed you in […]

Pwnies on order – they’re here!

So I decided to start ordering everything I need for building out the PwnPad community edition –  and in 3-5 days, depending on shipping, I should have my own PwnPad. While I wait for the order I have been watching some of the great videos: http://www.youtube.com/watch?v=SgisYjP_nIE More to come when I start getting everything in. […]

Snippy is my new friend

If your like me you want your reports to look nice and include detail pictures – after all a picture is worth a 100 words right? So off to my long time favorites Snagit and the ole fall back alt+print screen => both work but they both have their draw backs. For Snagit you have to download the program – […]

More Free Training

In an efort to continously share free training/seminars I come accross, I wanted to share the following NIST framework: http://www.nist.gov/itl/csd/cybersecurity-framework-workshop.cfm If you are in the MD/DC/VA area and can get away for a day I suggest you register.

Google “helping hands”

I was tooling through my twitter feed the other day and came across Google’s, what I am calling, “helping hands” site offering assistance to anyone that has been hacked: http://www.google.com/webmasters/hacked/ The guide is simple to follow and has several steps a webmaster can follow if they think they been hacked. I suggest anyone interested in security […]

Kali Linux (BT6)

With the release of the new Kali linux (the revamped Backtrack – much more than BT6 but I have others call it that), I wanted to put out a mind map of the tools on the distro so you can get used to where everything is.  I hope you enjoy it and find it useful. http://tinyurl.com/chz6u8c […]

RSA Final keynote

Well I must say I learned a lot about trying to blog the live from a conference and have a much higher respect for those that do this day to day. I liked it but was unprepared wireless was crappy, going through the phone drained it (did have it chained to laptop and that worked […]

RSA software defined data center is turning security on its head

Software defined data center =sddc Software defined security = sds Ssdc abstract the hardware and do everything from within software. The compute storage and network have to be extended across multiple boundaries. Security expands all three. Adding the components on the right (ie security) extends the virtualization time from minutes to days – so how […]