Skip to main content

Blog

30.Mar.2016
Martin Jartelius
08.Mar.2016
Security teams won’t be using file integrity monitoring (FIM) as their first line of defence for network protection. Tools like daily vulnerability audits and twice-yearly penetration testing will be the main border control assets that you employ. But just like a country can find it has leaky borders, it’s good practice to make sure that your IT assets don’t have any blackhat activities lurking within your network. And one of the final ways of checking every neighbourhood in your network is FIM.
03.Feb.2016
Martin Jartelius and John Stock
02.Sep.2014
Pwnie Express, an Outpost24 company
In this post, we’ll build on the EvilAP attack by presenting victims a cloned version of the Facebook login page in an effort to capture their login credentials. Facebook is used only as an example here, the same method can be used with any website that features a login dialog.

Looking for anything in particular?

Type your search word here