Skip to main content


Martin Jartelius
Security teams won’t be using file integrity monitoring (FIM) as their first line of defence for network protection. Tools like daily vulnerability audits and twice-yearly penetration testing will be the main border control assets that you employ. But just like a country can find it has leaky borders, it’s good practice to make sure that your IT assets don’t have any blackhat activities lurking within your network. And one of the final ways of checking every neighbourhood in your network is FIM.
Martin Jartelius and John Stock
Pwnie Express, an Outpost24 company
In this post, we’ll build on the EvilAP attack by presenting victims a cloned version of the Facebook login page in an effort to capture their login credentials. Facebook is used only as an example here, the same method can be used with any website that features a login dialog.

Looking for anything in particular?

Type your search word here