Defcon is a meta-conference which anyone passionate by IT security should attend. It is more than a conference, it is the heaven of hackers and security
Pivoting to internal network via non-interactive shell
During a recent penetration test we have experienced the situation where we’ve gained remote code execution with limited privileges to a web server and had
NetRipper – Smart traffic sniffing for penetration testers
Ionut Popescu, Senior Security Consultant @ KPMG Romania has been accepted as speaker at the prestigious DEFCON conference. He will present one of his projects: NetRipper
Mobile penetration testing on Android using Drozer
Mobile phones have become an indispensable part of our daily life. We use mobile phones to communicate with our loved ones, for quick access to
Hacknet 2015
KPMG Europe’s internal information security conference – Hacknet, was held in Berlin and lasted two days, the 29th and the 30th of April. This year,
Writing a Metasploit post exploitation module
The exploitation of a machine is only one step in a penetration test. What do you do next? How can you pivot from the exploited