Phishing Anonymously?
We recently did a phishing campaign for a large client. One major difference between phishing and regular penetration testing is that instead of testing IT equipment, software and/or [...]
We recently did a phishing campaign for a large client. One major difference between phishing and regular penetration testing is that instead of testing IT equipment, software and/or [...]
Another round of the Hacking for Beer contest. This time, the plan was to send an email that will trigger an authentication request back to my machine and have my machine forward connections to [...]
This is the sixth and final part of the story of the smart card track at NSEC 2013. You can see the first five parts: part 1, part 2, part 3, part 4 and part 5. At the end of part 5, I had all [...]