blog

Our Latest Blogs

Explore our latest blog posts and stay secure in a digital world.

Update nessus from command line [Mac Yosemite]
July 26, 2015
Blacklock

Very often, I have encountered problems with updating nessus home feed plugins and components. This is the common message from Nessus.

Intercepting Android Native Application
November 14, 2014
Blacklock

Recently, we got an opportunity to do a security hands-on on an Android native application. This application does not communicate to internet via HTTP protocol or mobile browser. The application communicates with the remote server over TCP on some XYZ port.

Way to go – CREST Certified
August 19, 2014
Blacklock

Monday morning and you hear the great news. How does it feel? Just received an email fromCREST Australiathat I have cleared the exam and now I’m CREST certified professional…JI’m all excited…J

Automating NMAP Capabilities
August 8, 2014
Blacklock

Many times I have encountered a problem with projects where large scanning of network host is required. In that case, you simply cannot expect your consultant to scan each host individually, analyze output and list down all vulnerable ports/services. Yes..we can even detect open ports with Nessus but still it has a host limitation per scan.

Catching Back Doors through Code Reviews
July 18, 2014
Blacklock

Off late, code reviews have been gaining a lot of popularity. Organizations which till recently were content with a secure network and an occasional Penetration Test are now getting their application’s code reviewed before going live.

Local Data Storage Analysis with iOS Simulator
June 30, 2014
Blacklock

There have been times when a penetration tester is not able to install iOS application on a physical device while performing iOS application security assessment. This can happen due to various reasons

Malware Analysis - Does only WP installation file cleaning makes you secure?
June 2, 2014
Blacklock

One word answer “NO”. This is based on my experience w.r.t cleaning Wordpress (WP) sites against malware attack. Hackers mostly attack CMS based websites i.e.

Exploiting SSH key based authentication
May 23, 2014
Blacklock

This is rather be a quick post and intended to be a reference note for me (and you all).

Multiple IP Nessus 5.2 Automation Script
March 17, 2014
Blacklock

It is always been a pain to run Nessus when you have long list of IPs to be scanned within a short period of time. This typically happens when you are engaged in an internal pentest and you have multiple IPs to scan.

Subscribe to our newsletter

Join our newsletter today and enhance your knowledge with valuable insights. It's quick, easy, and free!

Be a Team Player
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.