by Andrei Grigoras | Nov 18, 2022 |
Before jumping into the basic resources that a pentester should be familiar with, we first need to have an overview on what Penetration Testing actually is. As most online resources will mention, pentesting is an exercise where security experts try to identify and...
by George Karpouzas | Oct 10, 2018 |
Part 1 In this blog post series, we will show you certain steps among with the tools used in order to conduct IoT security assessments. In this first part you will need a .bin file of a device firmware in order to continue. Tools needed file It...
by Yiannis Koukouras | Oct 1, 2018 |
During the Bsides Athens 2018 conference, I made a presentation on how – during a penetration test exercise – we managed to infiltrate malware and exfiltrate data in/out of a corporate secure laptop, that was using the “Walled Garden”...
by George Karpouzas | Sep 28, 2018 |
PassCat is an open source Windows native C++ application capable of retrieving the passwords stored locally on a computer. We have developed this tool with the hope that it will be useful to Penetration Testers and Red Teams that wish to collect the passwords stored...
by George Karpouzas | Sep 19, 2018 |
This is a quick and dirty cheat sheet / guide on how to extract Android .apk files from an Android device. Tools needed: SDK Platform-Tools for Windows Android SDK Platform-Tools is a component for the Android SDK. It includes tools that interface with the...