Skip to content

Security Café

Security Research and Services

  • Things we do on a daily basis
    • Red Team (DORA/TIBER) exercises
    • Web Application Penetration Testing
    • Mobile Application Penetration Testing
    • Infrastructure Penetration Testing
    • Vulnerability Assessment
  • CVEs, Talks and Tools
  • Contact
  • About

Author: Ionuț Ambrosie

Hacknet 2015

May 21, 2015 Ionuț Ambrosie

KPMG Europe’s internal information security conference – Hacknet, was held in Berlin and lasted two days, the 29th and the 30th of April. This year,

Continue reading

Scripting Metasploit for a Real-Life Pentest

March 25, 2015 Ionuț Ambrosie

During a recent internal penetration test, we got to the point where we had to search a lot of Windows machines for Domain Admin tokens.

Continue reading

When Cryptographic API Design Goes Wrong

February 18, 2015 Ionuț Ambrosie

Whether we like to admit it or not, failing to account for human factors and usability issues when designing secure systems can have unwanted consequences.

Continue reading

Top Posts

  • Introduction to Windows shellcode development - Part 1
  • Practical JSONP Injection
  • Mobile Pentesting 101 - Bypassing Biometric Authentication
  • Introduction to Windows shellcode development – Part 2
  • IoT Pentesting 101: How to Hack MQTT - The Standard for IoT Messaging

Blog Stats

  • 564,305 hits

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 156 other subscribers

Categories

  • Active Directory (4)
  • Announcements (2)
  • C2 (1)
  • Cloud Security (12)
    • aws (9)
    • Azure (3)
    • Kubernetes (1)
  • Conferences (4)
  • Embedded systems security (3)
    • IoT Pentesting (2)
  • Ethical Hacking (18)
  • General security (13)
  • IT Security Assurance (1)
  • IT Security Audit (2)
  • Metasploit (1)
  • Misc (20)
    • Artificial Intelligence (1)
    • Code Review (1)
    • CVE (1)
  • Mobile security (12)
  • Network security (7)
  • Operating systems (2)
  • Penetration Testing (24)
  • Pentest techniques (31)
  • Research (3)
  • Web security (13)
  • Wireless security (1)
Blog at WordPress.com.
  • Subscribe Subscribed
    • Security Café
    • Join 156 other subscribers
    • Already have a WordPress.com account? Log in now.
    • Security Café
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...