You are in the middle of an assessment , things are thick. SE is the only option but you are short on time. Users however are sloppy and the question begs to ask: What’s the Worst that could happen on an unlocked screen for a few minutes? Well Take these pointers at hand: Users Leave […]
HackBattle 2015 – Scenario 1- Part 2
For those that didn’t get part 1 click the button below: HackBattle 2015 Scenario 1 Part 1 Thou shalt not ignore hints – Hint 2 Later on as people got stuck on the easy bits. The second hint was given. Now being as easy as it is most people didn’t take heed to the words […]
It has become a trend with the 4 phase phish : Identify a target Attack the site Upload phishing page Email and Harvest Well from the previous post we identified some flaws in the phishing attack but that’s 2014. It gets worse when phishers become this uncreative. The uncreativity was an attempt in one of […]
The Phish Lives
So the Phish Still Lives. I’d like to call it a 419 but this seems closer home reason being , choice of name : MakOtieno Stephen <abbastephen13@gmail.com> How it was all meant to go down: Send the E-mail Get me to read and open an attachment that tells me to login to Gmail to read […]
Business Continuity Failures
Everyone Loves Good Backup Systems to ensure in event of anything you are back to business ASAP. This however can be your biggest downfall if done wrong. As of Yesterday (2014-10-09), WordPress Ready! Backup Plugin has this done wrong By Breaking two rules of the web: Logging Backup Process to a Web Viewable Interface on […]