by Yiannis Koukouras | Nov 14, 2025 |
There are 3 vectors that define a penetration test engagement. I. Knowledge of the attacker Blackbox The attacker has no previous knowledge of the scope, its technology stack nor the security controls implemented. Graybox The attacker has limited knowledge of the...
by Yiannis Koukouras | Nov 27, 2020 |
Due to the ongoing Covid-19 pandemic, teleworking has become the norm. Following our previous teleworking tips post, this one aims to help first-comers, both people and organisations to keep safe. It is usually those, who are the prime targets of black hat hackers. In...
by Yiannis Koukouras | Mar 18, 2020 |
When Sir Isaac Newton was in the university, the bubonic plague came around. Thus, he wasforced to stay in self-isolation in his dorm for a very big period of time. This was the time that hecame up with most of his big breakthroughs! When you are confined between four...
by Yiannis Koukouras | Oct 1, 2018 |
During the Bsides Athens 2018 conference, I made a presentation on how – during a penetration test exercise – we managed to infiltrate malware and exfiltrate data in/out of a corporate secure laptop, that was using the “Walled Garden”...
by Yiannis Koukouras | Jun 11, 2017 |
In 2016, it was the first time that Greece participated in the European Cyber Security Challenge (ECSC 2016), organized by ENISA. The formation, training and coaching of the Greek National CyberSecurity team was a purely community-driven event, organized by TwelveSec...