FuzzyNop

Hey kid, i'm a computer.

10/7/14

osascript: for local phishing

›
Lately I've been finding myself on victim's laptops and they have all been OSX. I found that instead of key-logging I could simply p...
4/4/13

Making IDA Pretty, Pretty Quickly

›
Hello World, Lately I've been spending more and more time staring at IDA Pro and have found the default color scheme somewhat lacking...
1 comment:
9/8/12

Pass the Hash without Metasploit

›
Problem: Recently I found the need to pass the hash without using Metasploit's psexec module . Ok, no problem, Google Fu engage.. ...
2 comments:
4/19/12

IDA Pro Book Chapter Two! TOOL TIME!

›
BTW, I'm not about to retype this whole IDA book  (obviously), so you should definitely buy it if you have not already. I am on chapte...
4/18/12

Reading: The IDA Pro Book, Posting: My Notes

›
For the few that may stumble across my blog. This is an exercise in public note taking. It helps me by keeping me accountable (I have about ...
9/27/11

Last week's presentation

›
http://vimeo.com/29355597 Tonight, Google Hacking!
9/2/11

USCC Again

›
There is a new US Cyber Challenge Open. Available at http://uscc.cyberquests.org/ This challenge focuses heavily on Web App Security, yo...
8/25/11

CEH Exam

›
Scheduled CEH Exam for Sept 13th, Taking version 6 since it is cheaper. Also got the 100 dollar application fee waived.
1 comment:
6/4/11

Google Code Lab

›

CISSP Access Control

›
So, Like I said, Here are the main points from the first chapter. Types of Access Control -Preventive -Deterrent -Detective -Correctiv...
2 comments:
›
Home
View web version
Powered by Blogger.