OUR BLOG
GDPR heads-up
Introduction Unless you have been living in a cave, you most probably have heard about the General Data Protection Regulation (GDPR) fuzz. Even worse, you might be responsible for actually implementing GDPR in your company/organization. Although the fines and...
Authorization Token manipulation using Burp Suite extender
Unsubscribe Technologies Security Study
From the beginning of the Internet, sending of junk email has been prohibited. Gary Thuerk sent the first email Spam message in 1978 to 600 people. A few decades later the European Union came to regulate this issue permanently with EU Directive 2002/58/EC, 1 year...
Forming the Greek National Cyber Security team
TwelveSec and the Department of Digital Systems of the University of Piraeus are proud to be organising the Greek National Cyber Security team! ENISA (the European Union Agency for Network and Information Security) is running its annual European Cyber Security...
Would you enrich your password list with your client passwords?
Gaining access to a remote system always gives us pentesters a feeling of satisfaction. Specifically, gaining remote command execution on a system is the ultimate goal for a pentester, in order to gain an initial foothold into the target’s system. Besides direct...
Using a GSM tester to intercept calls and SMS (Part 2): Equipment and setup
Practical Setup and tools In the previous "Using a GSM tester" post, we examined the theoretical aspect of the fake base station attack. Today, we will focus on more technical details, discussing about the equipment needed, and the setup required for the...