
infoseckenya.blogspot.com
Infosec KenyaMy take on security, tutorials and research.
http://infoseckenya.blogspot.com/
My take on security, tutorials and research.
http://infoseckenya.blogspot.com/
TODAY'S RATING
>1,000,000
Date Range
HIGHEST TRAFFIC ON
Thursday
LOAD TIME
0.6 seconds
16x16
32x32
PAGES IN
THIS WEBSITE
19
SSL
EXTERNAL LINKS
1
SITE IP
172.217.12.193
LOAD TIME
0.561 sec
SCORE
6.2
Infosec Kenya | infoseckenya.blogspot.com Reviews
https://infoseckenya.blogspot.com
My take on security, tutorials and research.
Infosec Kenya: HACKING FACEBOOK ACCOUNTS
http://infoseckenya.blogspot.com/2011/05/hacking-facebook-accounts.html
My take on security, tutorials and research. Friday, May 13, 2011. My wireshark adventures continue, this time round I decided to focus on using the information I obtained from my sniffing captures and see how I could leverage that to break into something J. Before reading on ,let it be known that this attack is easily nullified by setting your facebook account to use https instead of http. Here is how to set your account to use https:. Select account settings and click. Click on account security. Httpco...
Infosec Kenya: April 2014
http://infoseckenya.blogspot.com/2014_04_01_archive.html
My take on security, tutorials and research. Tuesday, April 8, 2014. I recently had an opportunity to do a presentation on Android security at USIU (United States International University), Nairobi and had great time. Thanks to the students for listening and the questions and administration for the chance to spread the Android security gospel. This is the same presentation I gave at the first AfricaHackon. Subscribe to: Posts (Atom). AUTO - MIGRATE A METERPRETER SESSION. REVERSE ENGINEERING ANDROID APPS.
Infosec Kenya: AUTOMATIC SSH - DHCP - BACKTRACK
http://infoseckenya.blogspot.com/2011/03/automatic-ssh-dhcp-backtrack.html
My take on security, tutorials and research. Thursday, March 24, 2011. AUTOMATIC SSH - DHCP - BACKTRACK. I needed to set up my backtrack machine so i could ssh into it from my normal workstation and do interesting stuff when idle. My aspiration was set back by the following facts:. 1) sshd is not enabled by default to boot at system start. 2) Backtrack 4 doesn't bring up the ethernet interface by default on boot, this interface is needed by sshd to bind to. Rc - runlevel compatibility. AUTO - MIGRATE A M...
Infosec Kenya: October 2013
http://infoseckenya.blogspot.com/2013_10_01_archive.html
My take on security, tutorials and research. Friday, October 4, 2013. Benfords Law And Fraud Detection. A particularly interesting mathematical law that finds application in fraud detection is Benford's law or the first digit law. The law refers to the frequency distribution of digits in many (but not all) real-life sources of data. By real life, data like date , age, regularly incremented data does not qualify. The probabilities of the first digit from Benford's law once plotted show the curve below.
Infosec Kenya: PASS THE HASH ATTACK
http://infoseckenya.blogspot.com/2011/03/pass-hash-attack.html
My take on security, tutorials and research. Tuesday, March 8, 2011. PASS THE HASH ATTACK. Once a windows user creates a username and password, the password is hashed by two algorithms i.e LM (LAN MANAGER) which uses DES (data encryption standard) algorithm and the NTLM (NT lan manager). The resultant hashes are concatenated to form one single hash file that is stored in the sam file. Once you have compromised one machine, you can leverage the hash information obtained by the hashdump utility. BLANK PASS...
TOTAL PAGES IN THIS WEBSITE
19
Simple script to check expiry dates on a java keystore (.jks) file | David Gouveia
http://www.davidgouveia.net/2013/07/simple-script-to-check-expiry-dates-on-a-java-keystore-jks-file
Bits and Bytes of geekly information. Android ksoap2 stub generator. Strava GPX merge tool. Controlling relays using Micropython and an ESP8266. ZSUN Wifi card reader part 2 – EAGET A50. How to setup Ozone Strike Battle keyboard on OSX. Avoid being locked out of your ZSUN wifi reader. Esp8266 Witty ( kind of ) intro. On Avoid being locked out of your ZSUN wifi reader. On How to setup Ozone Strike Battle keyboard on OSX. On Avoid being locked out of your ZSUN wifi reader. July 11, 2013. Timeout -k 10s 5s.
TOTAL LINKS TO THIS WEBSITE
1
Website hosted by Entropy Internet
Welcome to Your New Hosting Package. This is your index.html page. Please replace this when you upload your website.
InfoSecJunction :: Your Information Security Partner
Welcome toInformation Security Junction. This is a Junction. For all your information security related matters. We aimed to focus Information Security related news, articles, subjects, interviews, products and so on. Feel free to submit your views, queries, feedback to improve the knowledge on Information Security. You may send your queries to info@infosecjunction.com. 25/04/2013 How twitter security becomes National Security Concern? Hackers target Abu Dhabi residents. The Cobrapost.com website is s...
Information Security Kaizen - Information Security Continuous Improvement
Information Security Continuous Improvement. Sorry, but nothing matched your search terms. Please try again with some different keywords. Theme by Out the Box.
Paul Love - InfoSecKaizen
Kaizen is the Japanese word for continuous improvement. Paul is a technology leader with 20 years of experience managing information security in financial services, insurance, utilities, software, cloud services and government industries. Paul is highly skilled in security operations, security policies, incident response, threat intelligence and regulatory compliance. He is adept at making security understandable to business users. Paul Love speaking at a conference. Paul’s other sites:.
Paul Love - InfoSecKaizen
Kaizen is the Japanese word for continuous improvement. Paul is a technology leader with 20 years of experience managing information security in financial services, insurance, utilities, software, cloud services and government industries. Paul is highly skilled in security operations, security policies, incident response, threat intelligence and regulatory compliance. He is adept at making security understandable to business users. Paul Love speaking at a conference. Paul’s other sites:.
Infosec Kenya
My take on security, tutorials and research. Monday, February 9, 2015. Subscribe to: Posts (Atom). AUTO - MIGRATE A METERPRETER SESSION. The process used to gain access to a remote system may not always be stable and may crash locking you out of the system. You could always mi. REVERSE ENGINEERING ANDROID APPS. Having covered the security implications of being able to access data directory of android apps as root and what you information you can get. ANDROID HEAP DUMPS – A SECURITY PERSPECTIVE. One of th...
InfoSec Keynote Series
Infosec Keynote Series event by ClubHack is coming to Delhi/NCR. Partner – Ernst and Young, India. VP – Speciality Line and Reinsurance, Prudent. Advocate Cyber Crime, Supreme Court. InfoSec Keynote series talks are for the cream of the crop leaders of IT and security industry. IF you are one of the following, it’s a must attend event for you. CEO, CISO, CIO, CTO, CSO and even CFO. VP Engineering, VP Security. Director IT, Director Security. The Benefits of Keynote Event are:. Proudly powered by WordPress.
InfoSecKicks
I’ve talked about domain trusts more than many people probably care about. A few weeks ago I posted Domain Trusts: We’re Not Done Yet apparently there’s even more! History of the Disclosure Debate. History of the Disclosure Debate. Researchers Create First Firmware Worm That Attacks Macs. Researchers Create First Firmware Worm That Attacks Macs. Building an Empire with PowerShell. Building an Empire with PowerShell. Slide deck from "Building an Empire with PowerShell". Really good reading. Everyone knows...
infosecla
Lunes, 3 de diciembre de 2012. Saucedo Alfio re electo en Garbarino Lanús. El Cro. Saucedo Alfio re electo el viernes pasado en Garbarino Lanús por un nuevo periodo de 2 años con el acompañamiento de 36 votos positivos sobre 36 compañeros habilitados para votar. Miércoles, 28 de noviembre de 2012. Indemnización por muerte en el trabajo. ESTO GENERALMENTE NO SE CONOCE MUY BIEN Y. Cámara Nacional de Apelaciones del Trabajo -. 11 de Octubre de 2012. TRABAJADOR ASPIRANTE CON HIV. OTRO FALLO SOBRE DISCRIMINAC...
Information Security Playground
A collection of security related tips and tricks, articles, references, papers and tools. A few words bout the blog. Just a try to keep in one place anything interesting I come up to wile surfing the net. Occasionally I’ll try to post thoughts and expediencies regarding IT security, but that would be rare till I buy some free time… Cheers everyone, enjoy! Friday, 11 April 2008. Improving Software Security Analysis using Exploitation Properties. No Support for ASLR. No Support for SafeSEH. Posted by V for...