This is my personal blog, all data and information provided on this site is for informational purposes only. The views expressed on these pages are mine alone and not those of my employer.
I will from time to time post something that might be slightly or massively inaccurate, this is not due to laziness but merely to the fact that I'm not perfect and let’s face it neither are you, otherwise you wouldn't be reading my blog (unless Google lied to you..).
I welcome all comments and emails, which are presented in a positive and constructive manner, however I withhold the right to delete or not publish any comments that I feel are "negative". After all if you are taking the time to read and then comment why not do it in a positive manner.
- Been quiet on Twitter lately, been busy.. Sorry :) 2 days ago
- RT @infosec_blogs: Maltego – gotFlow (Netflow for Maltego): Recently I was asked to see if I could create some M... bit.ly/1LJ2JCX … 3 days ago
- RT @NCA_UK: NCA leads Europe-wide takedown of RAMNIT #botnet - 3m computers infected worldwide, 33,000 in UK ow.ly/JCOwk #CyberC… 4 days ago
- Maltego - gotFlow (Netflow for Maltego) #maltego wp.me/p1MrCx-6I 4 days ago
- RT @glennzw: Hey Internet, anyone got protips on creating an encrypted #BeagleBone @kalilinux installation? 5 days ago
- Building applications that you know will be put to good use is awesome.. oh and it's slightly Maltego related.. #doublewin 6 days ago
Category Archives: Pen Testing
A few days ago on twitter @markofu posted a tweet which at the time I didn’t give much thought to, but on reflection was actually true (especially in my case). The tweet went something like this. “Hi..How do I get … Continue reading
You may remember that in some of my previous blog posts I mentioned that I was studying for my Security+ exam, well the good news is that I passed the exam nearly 2 weeks ago (there isn’t any bad news). … Continue reading
Hello, apologises for the lack of posting I’ve been revising for an exam (which is tomorrow), regardless of that yesterday I took part in my first Cyber Security Challenge UK, I’ve never tried this sort of challenge before so was … Continue reading
First of a big thanks to @achillean and his awesome website over at http://www.shodanhq.com, the amount of information that gets collected and stored is mind-blowing. I had a brief email conversation with John when I decided to write this blog … Continue reading
So to make things a bit easier as I wander along the path of self enlightenment (or in this case learning more about InfoSec) I thought it was about time I built some sort of “lab” at home, so I … Continue reading
At the beginning of the week I wrote here about the Cookie’s that the Netscaler uses for persistence. In that post I explained how I discovered that the Cookie name was encrypted using a simple substitution cipher. The cookie value … Continue reading