Mapping Mobile App APIs

Recently I have been attempting several bug bounties through companies such as Bugcrowd, CrowdCurity, etc. For the latest bounty I was ready and waiting as soon as the details became available. However, after reading the details I was slightly disappointed, it was a mobile app. I haven't really gotten into…

McAfee Agent Custom Properties

The McAfee EPO agent reports back quite a few system details out of the box, however you may run into a situation where a piece of data is not being collected that may be critical to your system management. For example you wish to obtain the service tag or hardware…

IPTables Simplified

One common problem I come across when conducting vulnerability assessments is the lack of a host firewall or understanding on its configuration. IPTables is the standard firewall on most linux based OSes and once understood is a simple to configure and powerful packet filtering firewall. Often I see unnecessarily complex…

Quick Malware Analysis

Not fully understanding a malware threat before eradicating it can sometimes be a grave mistake. Formatting or re-imaging a computer without fully understanding the threat will only lead back to that computer being infected again and a continued threat to other computers on your network may still be present. Even…