Android 7: Intercepting App Traffic

A standard aspect of any mobile application security (MAS) assessment is intercepting and analyzing network traffic generated by the application under […]

Email Hunting – Recon with Hunter.io

The Problem with OSINT… Something we as pentesters have to contend with on each of our engagements is recon. It […]

Let’s Build an Arcade Cabinet: Episode V

The project is finally complete. It’s been roughly nine months since we got started, but we finally have a working […]

Building a Convincing USB Drop

One of my favorite attack vectors is the USB drop. At SecureState, our two go-to drops are the Rubber Ducky and […]

Meterpreter Transports: Digging in with your Shell!

The scenario is all too familiar: Its a been a long week of digital warfare, and you are about to […]

Leveraging MS16-032 with PowerShell Empire

It’s not very often in the life of a pentester that you find a point-and-click exploit that works right out […]