This is my personal blog, all data and information provided on this site is for informational purposes only. The views expressed on these pages are mine alone and not those of my employer.
I will from time to time post something that might be slightly or massively inaccurate, this is not due to laziness but merely to the fact that I'm not perfect and let’s face it neither are you, otherwise you wouldn't be reading my blog (unless Google lied to you..).
I welcome all comments and emails, which are presented in a positive and constructive manner, however I withhold the right to delete or not publish any comments that I feel are "negative". After all if you are taking the time to read and then comment why not do it in a positive manner.
- Example of the reverse image search transform in action. http://t.co/ApxtAlUmsE 4 days ago
- My Reverse Image #Maltego transform can be found here: itgeekchronicles.co.uk/public-tds/ and some others.. 4 days ago
- Reverse Image search Maltego Transform almost done, that brings the total to 22.. 5 days ago
- Lesson learnt today, if writing python to query google search make sure to include User-Agent in your request 6 days ago
- It's been one of those frustrating days.. grrr.. 1 week ago
- RT @BSidesLondon: #BSidesLDN2015 - Still time to submit Logos, CFPs, CFWs, Rookies, Mentors! visit our home page for more details http://t.… 1 week ago
Category Archives: Security
First of a big thanks to @achillean and his awesome website over at http://www.shodanhq.com, the amount of information that gets collected and stored is mind-blowing. I had a brief email conversation with John when I decided to write this blog … Continue reading
So to make things a bit easier as I wander along the path of self enlightenment (or in this case learning more about InfoSec) I thought it was about time I built some sort of “lab” at home, so I … Continue reading
I’m not the most organised person, especially when it comes to staying focused on something (sorry was I talking about??). If you’ve read this blog before you would have picked up that I’ve decided to expand on my IT Security … Continue reading
On April the 25th 2012 a group of crack InfoSec professionals, enthusiasts, hobbyist and newbies (that’s me by the way), descended on the Barbican Centre in London for the security event of the year (in my opinion). That’s right; B-Sides … Continue reading
Apologises in advance if I ramble during this post or if it seems a bit long, there is a point to it and hopefully it will be come more clear as we go. DISCLAIMER: The following post is the random … Continue reading
So this is the final part to my Netscaler cookie series. If you haven’t read the other two blog posts you may want to just so this makes a bit of sense.. Part 1 Part 2 All make sense now?? … Continue reading
At the beginning of the week I wrote here about the Cookie’s that the Netscaler uses for persistence. In that post I explained how I discovered that the Cookie name was encrypted using a simple substitution cipher. The cookie value … Continue reading
Today was the first day back after my Christmas break, so it was a bit “slow”. Never to sit around being bored, I was writing up some notes on Netscaler cookie’s for an ethical hacker called Alejandro Nolla who has … Continue reading