This is my personal blog, all data and information provided on this site is for informational purposes only. The views expressed on these pages are mine alone and not those of my employer.
I will from time to time post something that might be slightly or massively inaccurate, this is not due to laziness but merely to the fact that I'm not perfect and let’s face it neither are you, otherwise you wouldn't be reading my blog (unless Google lied to you..).
I welcome all comments and emails, which are presented in a positive and constructive manner, however I withhold the right to delete or not publish any comments that I feel are "negative". After all if you are taking the time to read and then comment why not do it in a positive manner.
- RT @undeadsecurity: Want to do a quick audit of whats running in your AWS space with Maltego ? github.com/znb/Elastic-El…. Add your region, ru… 1 day ago
- Awesome day more work queued up glad I like to be busy :) ps man flu sucks :( 3 days ago
- Added a couple more transforms to Media Monkey (more to come). sneakersinc.net/docs/MediaMonk… 4 days ago
- RT @BSidesLondon: Like the #BSidesLDN2015 logo submissions? Now's your chance to decide for the official logo. Voting open: https://t.co/Fk… 6 days ago
- RT @J4vv4D: Bloggage, why I joined @alienvault - Climbing rocks, not ladders alienvault.com/blogs/security… 1 week ago
- As much as I like VMware, Vagrant is AWESOME.. automate all the things.. 1 week ago
Category Archives: Security
First of a big thanks to @achillean and his awesome website over at http://www.shodanhq.com, the amount of information that gets collected and stored is mind-blowing. I had a brief email conversation with John when I decided to write this blog … Continue reading
So to make things a bit easier as I wander along the path of self enlightenment (or in this case learning more about InfoSec) I thought it was about time I built some sort of “lab” at home, so I … Continue reading
I’m not the most organised person, especially when it comes to staying focused on something (sorry was I talking about??). If you’ve read this blog before you would have picked up that I’ve decided to expand on my IT Security … Continue reading
On April the 25th 2012 a group of crack InfoSec professionals, enthusiasts, hobbyist and newbies (that’s me by the way), descended on the Barbican Centre in London for the security event of the year (in my opinion). That’s right; B-Sides … Continue reading
Apologises in advance if I ramble during this post or if it seems a bit long, there is a point to it and hopefully it will be come more clear as we go. DISCLAIMER: The following post is the random … Continue reading
So this is the final part to my Netscaler cookie series. If you haven’t read the other two blog posts you may want to just so this makes a bit of sense.. Part 1 Part 2 All make sense now?? … Continue reading
At the beginning of the week I wrote here about the Cookie’s that the Netscaler uses for persistence. In that post I explained how I discovered that the Cookie name was encrypted using a simple substitution cipher. The cookie value … Continue reading
Today was the first day back after my Christmas break, so it was a bit “slow”. Never to sit around being bored, I was writing up some notes on Netscaler cookie’s for an ethical hacker called Alejandro Nolla who has … Continue reading