Category Archives: Security

Environment Disclosure via #shodan

First of a big thanks to @achillean and his awesome website over at http://www.shodanhq.com, the amount of information that gets collected and stored is mind-blowing. I had a brief email conversation with John when I decided to write this blog … Continue reading

Posted in General, Pen Testing, Ruby, Security, ShodanHQ | Leave a comment

What’s in your lab??

So to make things a bit easier as I wander along the path of self enlightenment (or in this case learning more about InfoSec) I thought it was about time I built some sort of “lab” at home, so I … Continue reading

Posted in General, Pen Testing, Security | 4 Comments

Man with a plan – My training plan

I’m not the most organised person, especially when it comes to staying focused on something (sorry was I talking about??). If you’ve read this blog before you would have picked up that I’ve decided to expand on my IT Security … Continue reading

Posted in BSidesLondon, General, Mentoring, Programming, Security | 4 Comments

Popping my cherry – B-Sides London 2012

On April the 25th 2012 a group of crack InfoSec professionals, enthusiasts, hobbyist and newbies (that’s me by the way), descended on the Barbican Centre in London for the security event of the year (in my opinion). That’s right; B-Sides … Continue reading

Posted in BSidesLondon, General, Security | Leave a comment

Don’t be shy, give it a try.. Mentoring

Apologises in advance if I ramble during this post or if it seems a bit long, there is a point to it and hopefully it will be come more clear as we go. DISCLAIMER: The following post is the random … Continue reading

Posted in General, Mentoring, Security | Tagged , | Leave a comment

Netscalers: Making sense of the cookie – the finale

So this is the final part to my Netscaler cookie series. If you haven’t read the other two blog posts you may want to just so this makes a bit of sense.. Part 1 Part 2 All make sense now?? … Continue reading

Posted in Cryptography, General, Netscaler, Programming, Python | 1 Comment

Netscalers: Making sense of the cookie – part 2

At the beginning of the week I wrote here about the Cookie’s that the Netscaler uses for persistence. In that post I explained how I discovered that the Cookie name was encrypted using a simple substitution cipher. The cookie value … Continue reading

Posted in Cryptography, Netscaler, Pen Testing, Security | 4 Comments

Netscaler: Making sense of the Cookie – part 1

Today was the first day back after my Christmas break, so it was a bit “slow”. Never to sit around being bored, I was writing up some notes on Netscaler cookie’s for an ethical hacker called Alejandro Nolla who has … Continue reading

Posted in Cryptography, Netscaler | 4 Comments

Security: Penetration Testers Flow Diagram

Hello reader, hope you are enjoying this festive time of year and are looking forward to the new year just around the corner. I’ve mentioned before in my blog that a “passion” of mine is IT Security (or InfoSec), it’s … Continue reading

Posted in Pen Testing, Security | Leave a comment