Android 7: Intercepting App Traffic

A standard aspect of any mobile application security (MAS) assessment is intercepting and analyzing network traffic generated by the application under […]

All In One OSINT

If we’ve said it once, we’ve said it a thousand times: OSINT is an attacker’s best friend. There are a […]

Weaponizing hostapd-wpe

TL;DR: Installing hostapd-wpe on a wireless router powered by an external power bank provides a standalone wireless attack platform with […]

Footprinting the Target with Recon-ng

Thank you for dropping in for part 2 of our tutorial series on LaNMaSteR53’s Recon-ng information gathering framework. Last time, […]

Obfuscating Launchers to Limit Detection

Last time, I provided a method for encrypting macro payloads (https://warroom.securestate.com/encrypt-macros-bypass-sandboxes/)  to prevent them from executing correctly in the event […]

Segmenting, Subnetting and You

I  completed a week of Cisco Certified Network Associate (CCNA) training and passed the exam.  I learned an interesting bit […]