Search Results

Blog

Category

Webinar Video: Think Like a Hacker

Webinar Video: Think Like a Hacker

When your job is to create and build a new product, intentionally breaking your creations seems wrong. Not to a hacker. They do not see your products as elegant designs that solve problems. Hackers see your product as a means to an end. When we look back over the past...
More Hacking SQL Servers Without a Password

More Hacking SQL Servers Without a Password

Hacking SQL servers is fun. Early this year, I blogged about hacking SQL servers without a password. I used Ettercap to perform a man-in-the-middle attack between a Microsoft SQL server and client. Using Ettercap filters I showed how you can replace a SQL query with...
Hacking Nagios: The Importance of System Hardening

Hacking Nagios: The Importance of System Hardening

System hardening is important. Keeping systems in a hardened state is equally important.  Good hardening should not only including keeping all the patches up-to-date, but also disabling all unnecessary services. The services that are necessary, must to be configured...

RSA Conference 2016 – Prelude to Lunacy

Alas, poor Amit! I knew it, RSA 2016, a cybersecurity conference of infinite jest, of most excellent fancy. Here begins the week posturing, posing, raving, screeching, blathering, drinking, and high-performance irrational exuberance.  RSA Conference 2016 is about to...